Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2009-2910 (GCVE-0-2009-2910)
Vulnerability from cvelistv5
Published
2009-10-20 17:00
      Modified
2024-08-07 06:07
      
          Severity ?
        
        
          VLAI Severity ?
        
        
          EPSS score ?
        
        CWE
          - n/a
 
Summary
arch/x86/ia32/ia32entry.S in the Linux kernel before 2.6.31.4 on the x86_64 platform does not clear certain kernel registers before a return to user mode, which allows local users to read register values from an earlier process by switching an ia32 process to 64-bit mode.
            
          
        References
          {
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T06:07:37.244Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.31.4"
          },
          {
            "name": "RHSA-2009:1671",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2009-1671.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.kernel.org/?p=linux/kernel/git/x86/linux-2.6-tip.git%3Ba=commit%3Bh=24e35800cdc4350fc34e2bed37b608a9e13ab3b6"
          },
          {
            "name": "RHSA-2009:1540",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://rhn.redhat.com/errata/RHSA-2009-1540.html"
          },
          {
            "name": "USN-864-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/usn-864-1"
          },
          {
            "name": "36927",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/36927"
          },
          {
            "name": "oval:org.mitre.oval:def:7359",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7359"
          },
          {
            "name": "37351",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/37351"
          },
          {
            "name": "37075",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/37075"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.avaya.com/css/P8/documents/100073666"
          },
          {
            "name": "SUSE-SA:2009:056",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00007.html"
          },
          {
            "name": "SUSE-SA:2010:012",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html"
          },
          {
            "name": "[oss-security] 20091001 Re: CVE Request (kernel)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2009/10/02/1"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=526788"
          },
          {
            "name": "oval:org.mitre.oval:def:10823",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10823"
          },
          {
            "name": "36576",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/36576"
          },
          {
            "name": "[oss-security] 20091002 Re: CVE Request (kernel)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=oss-security\u0026m=125444390112831\u0026w=2"
          },
          {
            "name": "[oss-security] 20091009 Re: CVE Request (kernel)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=oss-security\u0026m=125511635004768\u0026w=2"
          },
          {
            "name": "[oss-security] 20091001 CVE Request (kernel)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=oss-security\u0026m=125442304214452\u0026w=2"
          },
          {
            "name": "FEDORA-2009-10525",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00483.html"
          },
          {
            "name": "RHSA-2010:0095",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://rhn.redhat.com/errata/RHSA-2010-0095.html"
          },
          {
            "name": "RHSA-2010:0046",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://rhn.redhat.com/errata/RHSA-2010-0046.html"
          },
          {
            "name": "[linux-kernel] 20091001 [tip:x86/urgent] x86: Don\u0027t leak 64-bit kernel register values to 32-bit processes",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lkml.org/lkml/2009/10/1/164"
          },
          {
            "name": "SUSE-SA:2009:054",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00005.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-10-01T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "arch/x86/ia32/ia32entry.S in the Linux kernel before 2.6.31.4 on the x86_64 platform does not clear certain kernel registers before a return to user mode, which allows local users to read register values from an earlier process by switching an ia32 process to 64-bit mode."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-18T12:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.31.4"
        },
        {
          "name": "RHSA-2009:1671",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2009-1671.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.kernel.org/?p=linux/kernel/git/x86/linux-2.6-tip.git%3Ba=commit%3Bh=24e35800cdc4350fc34e2bed37b608a9e13ab3b6"
        },
        {
          "name": "RHSA-2009:1540",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://rhn.redhat.com/errata/RHSA-2009-1540.html"
        },
        {
          "name": "USN-864-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/usn-864-1"
        },
        {
          "name": "36927",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/36927"
        },
        {
          "name": "oval:org.mitre.oval:def:7359",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7359"
        },
        {
          "name": "37351",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/37351"
        },
        {
          "name": "37075",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/37075"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.avaya.com/css/P8/documents/100073666"
        },
        {
          "name": "SUSE-SA:2009:056",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00007.html"
        },
        {
          "name": "SUSE-SA:2010:012",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html"
        },
        {
          "name": "[oss-security] 20091001 Re: CVE Request (kernel)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2009/10/02/1"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=526788"
        },
        {
          "name": "oval:org.mitre.oval:def:10823",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10823"
        },
        {
          "name": "36576",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/36576"
        },
        {
          "name": "[oss-security] 20091002 Re: CVE Request (kernel)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://marc.info/?l=oss-security\u0026m=125444390112831\u0026w=2"
        },
        {
          "name": "[oss-security] 20091009 Re: CVE Request (kernel)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://marc.info/?l=oss-security\u0026m=125511635004768\u0026w=2"
        },
        {
          "name": "[oss-security] 20091001 CVE Request (kernel)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://marc.info/?l=oss-security\u0026m=125442304214452\u0026w=2"
        },
        {
          "name": "FEDORA-2009-10525",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00483.html"
        },
        {
          "name": "RHSA-2010:0095",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://rhn.redhat.com/errata/RHSA-2010-0095.html"
        },
        {
          "name": "RHSA-2010:0046",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://rhn.redhat.com/errata/RHSA-2010-0046.html"
        },
        {
          "name": "[linux-kernel] 20091001 [tip:x86/urgent] x86: Don\u0027t leak 64-bit kernel register values to 32-bit processes",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lkml.org/lkml/2009/10/1/164"
        },
        {
          "name": "SUSE-SA:2009:054",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00005.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2009-2910",
    "datePublished": "2009-10-20T17:00:00",
    "dateReserved": "2009-08-20T00:00:00",
    "dateUpdated": "2024-08-07T06:07:37.244Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2009-2910\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2009-10-20T17:30:00.907\",\"lastModified\":\"2025-04-09T00:30:58.490\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"arch/x86/ia32/ia32entry.S in the Linux kernel before 2.6.31.4 on the x86_64 platform does not clear certain kernel registers before a return to user mode, which allows local users to read register values from an earlier process by switching an ia32 process to 64-bit mode.\"},{\"lang\":\"es\",\"value\":\"arch/x86/ia32/ia32entry.S en el kernel de Linux anteriores a v2.6.31.4 en plataformas x86_64 no limpia adecuadamente ciertos registros del kernel antes de regresar al modo usuario, lo que permite a usuarios locales leer valores del registro desde un proceso anterior mediante el cambio de un proceso ia32 al modo 64-bit\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:N/A:N\",\"baseScore\":2.1,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":3.9,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-200\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.6.31.4\",\"matchCriteriaId\":\"DF8153BE-F192-4143-B977-4424F9E592D9\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:suse:linux_enterprise_debuginfo:10:sp2:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E135846-8959-4D7E-A8E6-07F0EC15F010\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B42AB65-443B-4655-BAEA-4EB4A43D9509\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_desktop:10:sp2:*:*:*:*:*:*\",\"matchCriteriaId\":\"513797E6-FCE6-4E84-9B66-202541F9601E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CD2D897-E321-4CED-92E0-11A98B52053C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:10:sp2:*:*:*:*:*:*\",\"matchCriteriaId\":\"22A79A35-05DB-4B9F-AD3E-EA6F933CF10C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp2:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3BEE9CB-F0AF-44B1-B454-1AE2F04D7299\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"454A5D17-B171-4F1F-9E0B-F18D1E5CA9FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*\",\"matchCriteriaId\":\"7EBFE35C-E243-43D1-883D-4398D71763CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4747CC68-FAF4-482F-929A-9DA6C24CB663\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5D026D0-EF78-438D-BEDD-FC8571F3ACEB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2BCB73E-27BB-4878-AD9C-90C4F20C25A0\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:virtualization:5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C029C71B-EB6F-4A45-B138-FE140E100B2E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"133AAFA7-AF42-4D7B-8822-AA2E85611BF5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DD6917D-FE03-487F-9F2C-A79B5FCFBC5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54D669D4-6D7E-449D-80C1-28FA44F06FFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0AC5CD5-6E58-433C-9EB3-6DFE5656463E\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7000D33B-F3C7-43E8-8FC7-9B97AADC3E12\"}]}]}],\"references\":[{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/x86/linux-2.6-tip.git%3Ba=commit%3Bh=24e35800cdc4350fc34e2bed37b608a9e13ab3b6\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00005.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00007.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lkml.org/lkml/2009/10/1/164\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=oss-security\u0026m=125442304214452\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=oss-security\u0026m=125444390112831\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=oss-security\u0026m=125511635004768\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/36927\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/37075\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/37351\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.avaya.com/css/P8/documents/100073666\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.31.4\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2009/10/02/1\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2009-1671.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/36576\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/usn-864-1\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=526788\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10823\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7359\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://rhn.redhat.com/errata/RHSA-2009-1540.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://rhn.redhat.com/errata/RHSA-2010-0046.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://rhn.redhat.com/errata/RHSA-2010-0095.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00483.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/x86/linux-2.6-tip.git%3Ba=commit%3Bh=24e35800cdc4350fc34e2bed37b608a9e13ab3b6\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00005.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00007.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lkml.org/lkml/2009/10/1/164\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=oss-security\u0026m=125442304214452\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=oss-security\u0026m=125444390112831\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=oss-security\u0026m=125511635004768\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/36927\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/37075\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/37351\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.avaya.com/css/P8/documents/100073666\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.31.4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2009/10/02/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2009-1671.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/36576\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/usn-864-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=526788\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10823\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7359\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://rhn.redhat.com/errata/RHSA-2009-1540.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://rhn.redhat.com/errata/RHSA-2010-0046.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://rhn.redhat.com/errata/RHSA-2010-0095.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00483.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}],\"vendorComments\":[{\"organization\":\"Red Hat\",\"comment\":\"Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/CVE-2009-2910\\n\\nIt has been rated as having moderate security impact.\\n\\nIt was addressed in Red Hat Enterprise Linux 4, 5 and Red Hat Enterprise MRG via: https://rhn.redhat.com/errata/RHSA-2009-1671.html , https://rhn.redhat.com/errata/RHSA-2010-0046.html and https://rhn.redhat.com/errata/RHSA-2009-1540.html respectively.\\n\\nThis issue is not planned to be fixed in Red Hat Enterprise Linux 3, due to this product being in Production 3 of its maintenance life-cycle, where only qualified security errata of important and critical impact are addressed.\\n\\nFor further information about Errata Support Policy, visit: http://www.redhat.com/security/updates/errata/\",\"lastModified\":\"2010-01-21T00:00:00\"}]}}"
  }
}
  RHSA-2009:1540
Vulnerability from csaf_redhat
Published
2009-11-03 18:21
    Modified
2025-10-09 13:22
    Summary
Red Hat Security Advisory: kernel-rt security, bug fix, and enhancement update
    Notes
Topic
Updated kernel-rt packages that fix several security issues, multiple bugs,
and add enhancements are now available for Red Hat Enterprise MRG 1.1.
This update has been rated as having important security impact by the Red
Hat Security Response Team.
    Details
The kernel-rt packages contain the Linux kernel, the core of any Linux
operating system.
Security fixes:
* the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags were not cleared when a
setuid or setgid program was executed. A local, unprivileged user could use
this flaw to bypass the mmap_min_addr protection mechanism and perform a
NULL pointer dereference attack, or bypass the Address Space Layout
Randomization (ASLR) security feature. (CVE-2009-1895, Important)
* a system with SELinux enforced was more permissive in allowing local
users in the unconfined_t domain to map low memory areas even if the
mmap_min_addr restriction was enabled. This could aid in the local
exploitation of NULL pointer dereference bugs. (CVE-2009-2695, Important)
* missing initialization flaws were found in getname() implementations in
numerous network protocol implementations in the Linux kernel. Certain
data structures in these getname() implementations were not initialized
properly before being copied to user-space. These flaws could lead to an
information leak. (CVE-2009-3002, Important)
* a NULL pointer dereference flaw was found in each of the following
functions in the Linux kernel: pipe_read_open(), pipe_write_open(), and
pipe_rdwr_open(). When the mutex lock is not held, the i_pipe pointer could
be released by other processes before it is used to update the pipe's
reader and writer counters. This could lead to a local denial of service or
privilege escalation. (CVE-2009-3547, Important)
* a flaw was found in the Realtek r8169 Ethernet driver in the Linux
kernel. pci_unmap_single() presented a memory leak that could lead to IOMMU
space exhaustion and a system crash. An attacker on the local network could
abuse this flaw by using jumbo frames for large amounts of network traffic.
(CVE-2009-3613, Important)
* NULL pointer dereference flaws were found in the r128 driver in the
Linux kernel. Checks to test if the Concurrent Command Engine state was
initialized were missing in private IOCTL functions. An attacker could use
these flaws to cause a local denial of service or escalate their
privileges. (CVE-2009-3620, Important)
* Kees Cook and Steve Beattie discovered a race condition in the /proc
code in the Linux kernel. This could lead to information in the
"/proc/[pid]/maps" and "/proc/[pid]/smaps" files being leaked to users (who
would otherwise not have access to this information) during ELF loading.
This could help a local attacker bypass the ASLR security feature.
(CVE-2009-2691, Moderate)
* a NULL pointer dereference flaw was found in the md driver in the Linux
kernel. If the suspend_lo or suspend_hi file in "/sys/" is modified when
the disk array is inactive, it could lead to a local denial of service or
privilege escalation. By default, only root can write to these two files.
(CVE-2009-2849, Moderate)
* an information leak was found in the Linux kernel. On AMD64 systems,
32-bit processes could access and read certain 64-bit registers by
temporarily switching themselves to 64-bit mode. (CVE-2009-2910, Moderate)
* padding data in several core network structures was not initialized
properly before being sent to user-space, possibly leading to information
leaks. (CVE-2009-3228, CVE-2009-3612, Moderate)
* the unix_stream_connect() function in the Linux kernel did not check if a
UNIX domain socket was in the shutdown state. This could lead to a
deadlock. A local, unprivileged user could use this flaw to cause a denial
of service. (CVE-2009-3621, Moderate)
These updated packages also include bug fixes and enhancements. Users are
directed to the Realtime Security Update Release Notes for version 1.1 for
information on these changes, which will be available shortly from: 
http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_MRG/
Users should upgrade to these updated packages, which contain backported
patches to correct these issues and add enhancements. The system must be
rebooted for this update to take effect.
    Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
    {
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated kernel-rt packages that fix several security issues, multiple bugs,\nand add enhancements are now available for Red Hat Enterprise MRG 1.1.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel-rt packages contain the Linux kernel, the core of any Linux\noperating system.\n\nSecurity fixes:\n\n* the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags were not cleared when a\nsetuid or setgid program was executed. A local, unprivileged user could use\nthis flaw to bypass the mmap_min_addr protection mechanism and perform a\nNULL pointer dereference attack, or bypass the Address Space Layout\nRandomization (ASLR) security feature. (CVE-2009-1895, Important)\n\n* a system with SELinux enforced was more permissive in allowing local\nusers in the unconfined_t domain to map low memory areas even if the\nmmap_min_addr restriction was enabled. This could aid in the local\nexploitation of NULL pointer dereference bugs. (CVE-2009-2695, Important)\n\n* missing initialization flaws were found in getname() implementations in\nnumerous network protocol implementations in the Linux kernel. Certain\ndata structures in these getname() implementations were not initialized\nproperly before being copied to user-space. These flaws could lead to an\ninformation leak. (CVE-2009-3002, Important)\n\n* a NULL pointer dereference flaw was found in each of the following\nfunctions in the Linux kernel: pipe_read_open(), pipe_write_open(), and\npipe_rdwr_open(). When the mutex lock is not held, the i_pipe pointer could\nbe released by other processes before it is used to update the pipe\u0027s\nreader and writer counters. This could lead to a local denial of service or\nprivilege escalation. (CVE-2009-3547, Important)\n\n* a flaw was found in the Realtek r8169 Ethernet driver in the Linux\nkernel. pci_unmap_single() presented a memory leak that could lead to IOMMU\nspace exhaustion and a system crash. An attacker on the local network could\nabuse this flaw by using jumbo frames for large amounts of network traffic.\n(CVE-2009-3613, Important)\n\n* NULL pointer dereference flaws were found in the r128 driver in the\nLinux kernel. Checks to test if the Concurrent Command Engine state was\ninitialized were missing in private IOCTL functions. An attacker could use\nthese flaws to cause a local denial of service or escalate their\nprivileges. (CVE-2009-3620, Important)\n\n* Kees Cook and Steve Beattie discovered a race condition in the /proc\ncode in the Linux kernel. This could lead to information in the\n\"/proc/[pid]/maps\" and \"/proc/[pid]/smaps\" files being leaked to users (who\nwould otherwise not have access to this information) during ELF loading.\nThis could help a local attacker bypass the ASLR security feature.\n(CVE-2009-2691, Moderate)\n\n* a NULL pointer dereference flaw was found in the md driver in the Linux\nkernel. If the suspend_lo or suspend_hi file in \"/sys/\" is modified when\nthe disk array is inactive, it could lead to a local denial of service or\nprivilege escalation. By default, only root can write to these two files.\n(CVE-2009-2849, Moderate)\n\n* an information leak was found in the Linux kernel. On AMD64 systems,\n32-bit processes could access and read certain 64-bit registers by\ntemporarily switching themselves to 64-bit mode. (CVE-2009-2910, Moderate)\n\n* padding data in several core network structures was not initialized\nproperly before being sent to user-space, possibly leading to information\nleaks. (CVE-2009-3228, CVE-2009-3612, Moderate)\n\n* the unix_stream_connect() function in the Linux kernel did not check if a\nUNIX domain socket was in the shutdown state. This could lead to a\ndeadlock. A local, unprivileged user could use this flaw to cause a denial\nof service. (CVE-2009-3621, Moderate)\n\nThese updated packages also include bug fixes and enhancements. Users are\ndirected to the Realtime Security Update Release Notes for version 1.1 for\ninformation on these changes, which will be available shortly from: \n\nhttp://www.redhat.com/docs/en-US/Red_Hat_Enterprise_MRG/\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues and add enhancements. The system must be\nrebooted for this update to take effect.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2009:1540",
        "url": "https://access.redhat.com/errata/RHSA-2009:1540"
      },
      {
        "category": "external",
        "summary": "http://www.redhat.com/security/updates/classification/#important",
        "url": "http://www.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "http://kbase.redhat.com/faq/docs/DOC-18042",
        "url": "http://kbase.redhat.com/faq/docs/DOC-18042"
      },
      {
        "category": "external",
        "summary": "http://kbase.redhat.com/faq/docs/DOC-17866",
        "url": "http://kbase.redhat.com/faq/docs/DOC-17866"
      },
      {
        "category": "external",
        "summary": "529597",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529597"
      },
      {
        "category": "external",
        "summary": "529626",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529626"
      },
      {
        "category": "external",
        "summary": "530490",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=530490"
      },
      {
        "category": "external",
        "summary": "http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_MRG/",
        "url": "http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_MRG/"
      },
      {
        "category": "external",
        "summary": "511171",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=511171"
      },
      {
        "category": "external",
        "summary": "516171",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=516171"
      },
      {
        "category": "external",
        "summary": "517830",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=517830"
      },
      {
        "category": "external",
        "summary": "518132",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=518132"
      },
      {
        "category": "external",
        "summary": "518160",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=518160"
      },
      {
        "category": "external",
        "summary": "519305",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=519305"
      },
      {
        "category": "external",
        "summary": "520990",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=520990"
      },
      {
        "category": "external",
        "summary": "521999",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=521999"
      },
      {
        "category": "external",
        "summary": "522359",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=522359"
      },
      {
        "category": "external",
        "summary": "522501",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=522501"
      },
      {
        "category": "external",
        "summary": "522503",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=522503"
      },
      {
        "category": "external",
        "summary": "523986",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=523986"
      },
      {
        "category": "external",
        "summary": "526788",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=526788"
      },
      {
        "category": "external",
        "summary": "528139",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=528139"
      },
      {
        "category": "external",
        "summary": "528868",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=528868"
      },
      {
        "category": "external",
        "summary": "529137",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529137"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1540.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel-rt security, bug fix, and enhancement update",
    "tracking": {
      "current_release_date": "2025-10-09T13:22:11+00:00",
      "generator": {
        "date": "2025-10-09T13:22:11+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2009:1540",
      "initial_release_date": "2009-11-03T18:21:00+00:00",
      "revision_history": [
        {
          "date": "2009-11-03T18:21:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2009-11-03T13:21:07+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T13:22:11+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "MRG Realtime for RHEL 5 Server",
                "product": {
                  "name": "MRG Realtime for RHEL 5 Server",
                  "product_id": "5Server-MRG-Realtime-1.0",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_mrg:1::el5"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise MRG for RHEL-5"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
                "product": {
                  "name": "kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
                  "product_id": "kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@2.6.24.7-137.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
                "product": {
                  "name": "kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
                  "product_id": "kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@2.6.24.7-137.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
                "product": {
                  "name": "kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
                  "product_id": "kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug@2.6.24.7-137.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
                "product": {
                  "name": "kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
                  "product_id": "kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-devel@2.6.24.7-137.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
                "product": {
                  "name": "kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
                  "product_id": "kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-vanilla@2.6.24.7-137.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
                "product": {
                  "name": "kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
                  "product_id": "kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@2.6.24.7-137.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-0:2.6.24.7-137.el5rt.i686",
                "product": {
                  "name": "kernel-rt-0:2.6.24.7-137.el5rt.i686",
                  "product_id": "kernel-rt-0:2.6.24.7-137.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-137.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
                "product": {
                  "name": "kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
                  "product_id": "kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace@2.6.24.7-137.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
                "product": {
                  "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
                  "product_id": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@2.6.24.7-137.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
                "product": {
                  "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
                  "product_id": "kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@2.6.24.7-137.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
                "product": {
                  "name": "kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
                  "product_id": "kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common@2.6.24.7-137.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
                "product": {
                  "name": "kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
                  "product_id": "kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@2.6.24.7-137.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
                "product": {
                  "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
                  "product_id": "kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@2.6.24.7-137.el5rt?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
                  "product_id": "kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@2.6.24.7-137.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64",
                  "product_id": "kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@2.6.24.7-137.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
                  "product_id": "kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug@2.6.24.7-137.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
                  "product_id": "kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-devel@2.6.24.7-137.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
                  "product_id": "kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-vanilla@2.6.24.7-137.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
                  "product_id": "kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@2.6.24.7-137.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
                  "product_id": "kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-137.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
                  "product_id": "kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace@2.6.24.7-137.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
                  "product_id": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@2.6.24.7-137.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
                  "product_id": "kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@2.6.24.7-137.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
                  "product_id": "kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common@2.6.24.7-137.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
                  "product_id": "kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@2.6.24.7-137.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
                  "product_id": "kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@2.6.24.7-137.el5rt?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
                "product": {
                  "name": "kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
                  "product_id": "kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-doc@2.6.24.7-137.el5rt?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-0:2.6.24.7-137.el5rt.src",
                "product": {
                  "name": "kernel-rt-0:2.6.24.7-137.el5rt.src",
                  "product_id": "kernel-rt-0:2.6.24.7-137.el5rt.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-137.el5rt?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:2.6.24.7-137.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686"
        },
        "product_reference": "kernel-rt-0:2.6.24.7-137.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:2.6.24.7-137.el5rt.src as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src"
        },
        "product_reference": "kernel-rt-0:2.6.24.7-137.el5rt.src",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:2.6.24.7-137.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-0:2.6.24.7-137.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686"
        },
        "product_reference": "kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686"
        },
        "product_reference": "kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686"
        },
        "product_reference": "kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686"
        },
        "product_reference": "kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686"
        },
        "product_reference": "kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-0:2.6.24.7-137.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686"
        },
        "product_reference": "kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch"
        },
        "product_reference": "kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-0:2.6.24.7-137.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686"
        },
        "product_reference": "kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686"
        },
        "product_reference": "kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686"
        },
        "product_reference": "kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686"
        },
        "product_reference": "kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686"
        },
        "product_reference": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686"
        },
        "product_reference": "kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2009-1895",
      "discovery_date": "2009-06-30T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "511171"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The personality subsystem in the Linux kernel before 2.6.31-rc3 has a PER_CLEAR_ON_SETID setting that does not clear the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags when executing a setuid or setgid program, which makes it easier for local users to leverage the details of memory usage to (1) conduct NULL pointer dereference attacks, (2) bypass the mmap_min_addr protection mechanism, or (3) defeat address space layout randomization (ASLR).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: personality: fix PER_CLEAR_ON_SETID",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1895"
        },
        {
          "category": "external",
          "summary": "RHBZ#511171",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=511171"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1895",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1895"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1895",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1895"
        }
      ],
      "release_date": "2009-06-26T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T18:21:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1540"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: personality: fix PER_CLEAR_ON_SETID"
    },
    {
      "cve": "CVE-2009-2691",
      "discovery_date": "2009-08-07T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "516171"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The mm_for_maps function in fs/proc/base.c in the Linux kernel 2.6.30.4 and earlier allows local users to read (1) maps and (2) smaps files under proc/ via vectors related to ELF loading, a setuid process, and a race condition.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: /proc/$pid/maps visible during initial setuid ELF loading",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "We currently have no plans to fix this flaw in Red Hat Enterprise Linux 3, 4, and 5 as it is not possible to trigger the information leak if the suid_dumpable tunable is set to zero (which is the default).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-2691"
        },
        {
          "category": "external",
          "summary": "RHBZ#516171",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=516171"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2691",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-2691"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2691",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2691"
        }
      ],
      "release_date": "2009-07-10T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T18:21:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1540"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: /proc/$pid/maps visible during initial setuid ELF loading"
    },
    {
      "cve": "CVE-2009-2695",
      "discovery_date": "2009-08-17T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "517830"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The Linux kernel before 2.6.31-rc7 does not properly prevent mmap operations that target page zero and other low memory addresses, which allows local users to gain privileges by exploiting NULL pointer dereference vulnerabilities, related to (1) the default configuration of the allow_unconfined_mmap_low boolean in SELinux on Red Hat Enterprise Linux (RHEL) 5, (2) an error that causes allow_unconfined_mmap_low to be ignored in the unconfined_t domain, (3) lack of a requirement for the CAP_SYS_RAWIO capability for these mmap operations, and (4) interaction between the mmap_min_addr protection mechanism and certain application programs.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: SELinux and mmap_min_addr",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-2695"
        },
        {
          "category": "external",
          "summary": "RHBZ#517830",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=517830"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2695",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-2695"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2695",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2695"
        }
      ],
      "release_date": "2009-07-31T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T18:21:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1540"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: SELinux and mmap_min_addr"
    },
    {
      "cve": "CVE-2009-2849",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2009-08-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "518132"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The md driver (drivers/md/md.c) in the Linux kernel before 2.6.30.2 might allow local users to cause a denial of service (NULL pointer dereference) via vectors related to \"suspend_* sysfs attributes\" and the (1) suspend_lo_store or (2) suspend_hi_store functions.  NOTE: this is only a vulnerability when sysfs is writable by an attacker.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: md: NULL pointer deref when accessing suspend_* sysfs attributes",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The flaw was introduced in kernel version 2.6.17-rc1. The Linux kernel as shipped with Red Hat Enterprise Linux 3, and 4 are not affected by this issue.\n\nA future kernel update for Red Hat Enterprise Linux 5 will address this flaw.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-2849"
        },
        {
          "category": "external",
          "summary": "RHBZ#518132",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=518132"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2849",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-2849"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2849",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2849"
        }
      ],
      "release_date": "2009-07-01T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T18:21:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1540"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "HIGH",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.2,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: md: NULL pointer deref when accessing suspend_* sysfs attributes"
    },
    {
      "cve": "CVE-2009-2910",
      "discovery_date": "2009-10-01T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "526788"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "arch/x86/ia32/ia32entry.S in the Linux kernel before 2.6.31.4 on the x86_64 platform does not clear certain kernel registers before a return to user mode, which allows local users to read register values from an earlier process by switching an ia32 process to 64-bit mode.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: x86_64 32 bit process register leak",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is not planned to be fixed in Red Hat Enterprise Linux 3, due to this product being in Production 3 of its maintenance life-cycle, where only qualified security errata of important and critical impact are addressed.\n\nFor further information about Errata Support Policy, visit: https://access.redhat.com/support/policy/updates/errata/",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-2910"
        },
        {
          "category": "external",
          "summary": "RHBZ#526788",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=526788"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2910",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-2910"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2910",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2910"
        }
      ],
      "release_date": "2009-10-01T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T18:21:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1540"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: x86_64 32 bit process register leak"
    },
    {
      "cve": "CVE-2009-3002",
      "discovery_date": "2009-08-26T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "519305"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The Linux kernel before 2.6.31-rc7 does not initialize certain data structures within getname functions, which allows local users to read the contents of some kernel memory locations by calling getsockname on (1) an AF_APPLETALK socket, related to the atalk_getname function in net/appletalk/ddp.c; (2) an AF_IRDA socket, related to the irda_getname function in net/irda/af_irda.c; (3) an AF_ECONET socket, related to the econet_getname function in net/econet/af_econet.c; (4) an AF_NETROM socket, related to the nr_getname function in net/netrom/af_netrom.c; (5) an AF_ROSE socket, related to the rose_getname function in net/rose/af_rose.c; or (6) a raw CAN socket, related to the raw_getname function in net/can/raw.c.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: numerous getname() infoleaks",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "CVE-2009-3002 describes a collection of similar information leaks that affect numerous networking protocols.\n\nThe Linux kernel as shipped with Red Hat Enterprise Linux 4 and 5 did not enable support for the AppleTalk DDP protocol, and therefore were not affected by issue (1).\n\nThe Linux kernel as shipped with Red Hat Enterprise Linux 4, 5 and Red Hat Enterprise MRG did not enable support for IrDA sockets, and therefore were not affected by issue (2).\n\nThe Linux kernel as shipped with Red Hat Enterprise Linux 3, 4, 5, and Red Hat Enterprise MRG did not enable support for the Acorn Econet and AUN protocols, and therefore were not affected by issue (3).\n\nThe Linux kernel as shipped with Red Hat Enterprise Linux 4, 5, and Red Hat Enterprise MRG did not enable support for the NET/ROM and ROSE protocols, and therefore were not affected by issues (4) and (5).\n\nThe raw_getname() leak was introduced in the Linux kernel version 2.6.25-rc1. The Linux kernel as shipped with Red Hat Enterprise Linux 3, 4, 5, and Red Hat Enterprise MRG therefore were not affected by issue (6).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3002"
        },
        {
          "category": "external",
          "summary": "RHBZ#519305",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=519305"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3002",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3002"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3002",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3002"
        }
      ],
      "release_date": "2009-08-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T18:21:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1540"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: numerous getname() infoleaks"
    },
    {
      "cve": "CVE-2009-3228",
      "cwe": {
        "id": "CWE-401",
        "name": "Missing Release of Memory after Effective Lifetime"
      },
      "discovery_date": "2009-09-03T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "520990"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The tc_fill_tclass function in net/sched/sch_api.c in the tc subsystem in the Linux kernel 2.4.x before 2.4.37.6 and 2.6.x before 2.6.31-rc9 does not initialize certain (1) tcm__pad1 and (2) tcm__pad2 structure members, which might allow local users to obtain sensitive information from kernel memory via unspecified vectors.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: tc: uninitialised kernel memory leak",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3228"
        },
        {
          "category": "external",
          "summary": "RHBZ#520990",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=520990"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3228",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3228"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3228",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3228"
        }
      ],
      "release_date": "2009-09-02T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T18:21:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1540"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: tc: uninitialised kernel memory leak"
    },
    {
      "cve": "CVE-2009-3547",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2009-10-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "530490"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Multiple race conditions in fs/pipe.c in the Linux kernel before 2.6.32-rc6 allow local users to cause a denial of service (NULL pointer dereference and system crash) or gain privileges by attempting to open an anonymous pipe via a /proc/*/fd/ pathname.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: fs: pipe.c null pointer dereference",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3547"
        },
        {
          "category": "external",
          "summary": "RHBZ#530490",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=530490"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3547",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3547"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3547",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3547"
        }
      ],
      "release_date": "2009-10-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T18:21:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1540"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: fs: pipe.c null pointer dereference"
    },
    {
      "cve": "CVE-2009-3612",
      "discovery_date": "2009-10-14T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "528868"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The tcf_fill_node function in net/sched/cls_api.c in the netlink subsystem in the Linux kernel 2.6.x before 2.6.32-rc5, and 2.4.37.6 and earlier, does not initialize a certain tcm__pad2 structure member, which might allow local users to obtain sensitive information from kernel memory via unspecified vectors.  NOTE: this issue exists because of an incomplete fix for CVE-2005-4881.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: tcf_fill_node() infoleak due to typo in 9ef1d4c7",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is not planned to be fixed in Red Hat Enterprise Linux 3 due to this product being in Production 3 of its maintenance life-cycle, where only qualified security errata of important or critical impact are addressed.\n\nFor further information about the Errata Support Policy, visit: https://access.redhat.com/support/policy/updates/errata/",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3612"
        },
        {
          "category": "external",
          "summary": "RHBZ#528868",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=528868"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3612",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3612"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3612",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3612"
        }
      ],
      "release_date": "2009-10-08T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T18:21:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1540"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: tcf_fill_node() infoleak due to typo in 9ef1d4c7"
    },
    {
      "cve": "CVE-2009-3613",
      "discovery_date": "2009-10-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "529137"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The swiotlb functionality in the r8169 driver in drivers/net/r8169.c in the Linux kernel before 2.6.27.22 allows remote attackers to cause a denial of service (IOMMU space exhaustion and system crash) by using jumbo frames for a large amount of network traffic, as demonstrated by a flood ping.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: flood ping cause out-of-iommu error and panic when mtu larger than 1500",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3613"
        },
        {
          "category": "external",
          "summary": "RHBZ#529137",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529137"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3613",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3613"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3613",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3613"
        }
      ],
      "release_date": "2007-11-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T18:21:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1540"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: flood ping cause out-of-iommu error and panic when mtu larger than 1500"
    },
    {
      "cve": "CVE-2009-3620",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2009-10-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "529597"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The ATI Rage 128 (aka r128) driver in the Linux kernel before 2.6.31-git11 does not properly verify Concurrent Command Engine (CCE) state initialization, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly gain privileges via unspecified ioctl calls.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: r128 IOCTL NULL pointer dereferences when CCE state is uninitialised",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3620"
        },
        {
          "category": "external",
          "summary": "RHBZ#529597",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529597"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3620",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3620"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3620",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3620"
        }
      ],
      "release_date": "2009-08-30T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T18:21:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1540"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.9,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: r128 IOCTL NULL pointer dereferences when CCE state is uninitialised"
    },
    {
      "cve": "CVE-2009-3621",
      "discovery_date": "2009-10-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "529626"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "net/unix/af_unix.c in the Linux kernel 2.6.31.4 and earlier allows local users to cause a denial of service (system hang) by creating an abstract-namespace AF_UNIX listening socket, performing a shutdown operation on this socket, and then performing a series of connect operations to this socket.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: AF_UNIX: Fix deadlock on connecting to shutdown socket",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is not planned to be fixed in Red Hat Enterprise Linux 3, due to this product being in Production 3 of its maintenance life-cycle, where only qualified security errata of important or critical impact are addressed.\n\nFor further information about Errata Support Policy, visit: https://access.redhat.com/support/policy/updates/errata/",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3621"
        },
        {
          "category": "external",
          "summary": "RHBZ#529626",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529626"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3621",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3621"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3621",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3621"
        }
      ],
      "release_date": "2009-10-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T18:21:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1540"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.9,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: AF_UNIX: Fix deadlock on connecting to shutdown socket"
    }
  ]
}
  rhsa-2009_1540
Vulnerability from csaf_redhat
Published
2009-11-03 18:21
    Modified
2024-11-22 03:26
    Summary
Red Hat Security Advisory: kernel-rt security, bug fix, and enhancement update
    Notes
Topic
Updated kernel-rt packages that fix several security issues, multiple bugs,
and add enhancements are now available for Red Hat Enterprise MRG 1.1.
This update has been rated as having important security impact by the Red
Hat Security Response Team.
    Details
The kernel-rt packages contain the Linux kernel, the core of any Linux
operating system.
Security fixes:
* the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags were not cleared when a
setuid or setgid program was executed. A local, unprivileged user could use
this flaw to bypass the mmap_min_addr protection mechanism and perform a
NULL pointer dereference attack, or bypass the Address Space Layout
Randomization (ASLR) security feature. (CVE-2009-1895, Important)
* a system with SELinux enforced was more permissive in allowing local
users in the unconfined_t domain to map low memory areas even if the
mmap_min_addr restriction was enabled. This could aid in the local
exploitation of NULL pointer dereference bugs. (CVE-2009-2695, Important)
* missing initialization flaws were found in getname() implementations in
numerous network protocol implementations in the Linux kernel. Certain
data structures in these getname() implementations were not initialized
properly before being copied to user-space. These flaws could lead to an
information leak. (CVE-2009-3002, Important)
* a NULL pointer dereference flaw was found in each of the following
functions in the Linux kernel: pipe_read_open(), pipe_write_open(), and
pipe_rdwr_open(). When the mutex lock is not held, the i_pipe pointer could
be released by other processes before it is used to update the pipe's
reader and writer counters. This could lead to a local denial of service or
privilege escalation. (CVE-2009-3547, Important)
* a flaw was found in the Realtek r8169 Ethernet driver in the Linux
kernel. pci_unmap_single() presented a memory leak that could lead to IOMMU
space exhaustion and a system crash. An attacker on the local network could
abuse this flaw by using jumbo frames for large amounts of network traffic.
(CVE-2009-3613, Important)
* NULL pointer dereference flaws were found in the r128 driver in the
Linux kernel. Checks to test if the Concurrent Command Engine state was
initialized were missing in private IOCTL functions. An attacker could use
these flaws to cause a local denial of service or escalate their
privileges. (CVE-2009-3620, Important)
* Kees Cook and Steve Beattie discovered a race condition in the /proc
code in the Linux kernel. This could lead to information in the
"/proc/[pid]/maps" and "/proc/[pid]/smaps" files being leaked to users (who
would otherwise not have access to this information) during ELF loading.
This could help a local attacker bypass the ASLR security feature.
(CVE-2009-2691, Moderate)
* a NULL pointer dereference flaw was found in the md driver in the Linux
kernel. If the suspend_lo or suspend_hi file in "/sys/" is modified when
the disk array is inactive, it could lead to a local denial of service or
privilege escalation. By default, only root can write to these two files.
(CVE-2009-2849, Moderate)
* an information leak was found in the Linux kernel. On AMD64 systems,
32-bit processes could access and read certain 64-bit registers by
temporarily switching themselves to 64-bit mode. (CVE-2009-2910, Moderate)
* padding data in several core network structures was not initialized
properly before being sent to user-space, possibly leading to information
leaks. (CVE-2009-3228, CVE-2009-3612, Moderate)
* the unix_stream_connect() function in the Linux kernel did not check if a
UNIX domain socket was in the shutdown state. This could lead to a
deadlock. A local, unprivileged user could use this flaw to cause a denial
of service. (CVE-2009-3621, Moderate)
These updated packages also include bug fixes and enhancements. Users are
directed to the Realtime Security Update Release Notes for version 1.1 for
information on these changes, which will be available shortly from: 
http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_MRG/
Users should upgrade to these updated packages, which contain backported
patches to correct these issues and add enhancements. The system must be
rebooted for this update to take effect.
    Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
    {
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated kernel-rt packages that fix several security issues, multiple bugs,\nand add enhancements are now available for Red Hat Enterprise MRG 1.1.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel-rt packages contain the Linux kernel, the core of any Linux\noperating system.\n\nSecurity fixes:\n\n* the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags were not cleared when a\nsetuid or setgid program was executed. A local, unprivileged user could use\nthis flaw to bypass the mmap_min_addr protection mechanism and perform a\nNULL pointer dereference attack, or bypass the Address Space Layout\nRandomization (ASLR) security feature. (CVE-2009-1895, Important)\n\n* a system with SELinux enforced was more permissive in allowing local\nusers in the unconfined_t domain to map low memory areas even if the\nmmap_min_addr restriction was enabled. This could aid in the local\nexploitation of NULL pointer dereference bugs. (CVE-2009-2695, Important)\n\n* missing initialization flaws were found in getname() implementations in\nnumerous network protocol implementations in the Linux kernel. Certain\ndata structures in these getname() implementations were not initialized\nproperly before being copied to user-space. These flaws could lead to an\ninformation leak. (CVE-2009-3002, Important)\n\n* a NULL pointer dereference flaw was found in each of the following\nfunctions in the Linux kernel: pipe_read_open(), pipe_write_open(), and\npipe_rdwr_open(). When the mutex lock is not held, the i_pipe pointer could\nbe released by other processes before it is used to update the pipe\u0027s\nreader and writer counters. This could lead to a local denial of service or\nprivilege escalation. (CVE-2009-3547, Important)\n\n* a flaw was found in the Realtek r8169 Ethernet driver in the Linux\nkernel. pci_unmap_single() presented a memory leak that could lead to IOMMU\nspace exhaustion and a system crash. An attacker on the local network could\nabuse this flaw by using jumbo frames for large amounts of network traffic.\n(CVE-2009-3613, Important)\n\n* NULL pointer dereference flaws were found in the r128 driver in the\nLinux kernel. Checks to test if the Concurrent Command Engine state was\ninitialized were missing in private IOCTL functions. An attacker could use\nthese flaws to cause a local denial of service or escalate their\nprivileges. (CVE-2009-3620, Important)\n\n* Kees Cook and Steve Beattie discovered a race condition in the /proc\ncode in the Linux kernel. This could lead to information in the\n\"/proc/[pid]/maps\" and \"/proc/[pid]/smaps\" files being leaked to users (who\nwould otherwise not have access to this information) during ELF loading.\nThis could help a local attacker bypass the ASLR security feature.\n(CVE-2009-2691, Moderate)\n\n* a NULL pointer dereference flaw was found in the md driver in the Linux\nkernel. If the suspend_lo or suspend_hi file in \"/sys/\" is modified when\nthe disk array is inactive, it could lead to a local denial of service or\nprivilege escalation. By default, only root can write to these two files.\n(CVE-2009-2849, Moderate)\n\n* an information leak was found in the Linux kernel. On AMD64 systems,\n32-bit processes could access and read certain 64-bit registers by\ntemporarily switching themselves to 64-bit mode. (CVE-2009-2910, Moderate)\n\n* padding data in several core network structures was not initialized\nproperly before being sent to user-space, possibly leading to information\nleaks. (CVE-2009-3228, CVE-2009-3612, Moderate)\n\n* the unix_stream_connect() function in the Linux kernel did not check if a\nUNIX domain socket was in the shutdown state. This could lead to a\ndeadlock. A local, unprivileged user could use this flaw to cause a denial\nof service. (CVE-2009-3621, Moderate)\n\nThese updated packages also include bug fixes and enhancements. Users are\ndirected to the Realtime Security Update Release Notes for version 1.1 for\ninformation on these changes, which will be available shortly from: \n\nhttp://www.redhat.com/docs/en-US/Red_Hat_Enterprise_MRG/\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues and add enhancements. The system must be\nrebooted for this update to take effect.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2009:1540",
        "url": "https://access.redhat.com/errata/RHSA-2009:1540"
      },
      {
        "category": "external",
        "summary": "http://www.redhat.com/security/updates/classification/#important",
        "url": "http://www.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "http://kbase.redhat.com/faq/docs/DOC-18042",
        "url": "http://kbase.redhat.com/faq/docs/DOC-18042"
      },
      {
        "category": "external",
        "summary": "http://kbase.redhat.com/faq/docs/DOC-17866",
        "url": "http://kbase.redhat.com/faq/docs/DOC-17866"
      },
      {
        "category": "external",
        "summary": "http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_MRG/",
        "url": "http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_MRG/"
      },
      {
        "category": "external",
        "summary": "511171",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=511171"
      },
      {
        "category": "external",
        "summary": "516171",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=516171"
      },
      {
        "category": "external",
        "summary": "517830",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=517830"
      },
      {
        "category": "external",
        "summary": "518132",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=518132"
      },
      {
        "category": "external",
        "summary": "518160",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=518160"
      },
      {
        "category": "external",
        "summary": "519305",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=519305"
      },
      {
        "category": "external",
        "summary": "520990",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=520990"
      },
      {
        "category": "external",
        "summary": "521999",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=521999"
      },
      {
        "category": "external",
        "summary": "522359",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=522359"
      },
      {
        "category": "external",
        "summary": "522501",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=522501"
      },
      {
        "category": "external",
        "summary": "522503",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=522503"
      },
      {
        "category": "external",
        "summary": "523986",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=523986"
      },
      {
        "category": "external",
        "summary": "526788",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=526788"
      },
      {
        "category": "external",
        "summary": "528139",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=528139"
      },
      {
        "category": "external",
        "summary": "528868",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=528868"
      },
      {
        "category": "external",
        "summary": "529137",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529137"
      },
      {
        "category": "external",
        "summary": "529597",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529597"
      },
      {
        "category": "external",
        "summary": "529626",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529626"
      },
      {
        "category": "external",
        "summary": "530490",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=530490"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1540.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel-rt security, bug fix, and enhancement update",
    "tracking": {
      "current_release_date": "2024-11-22T03:26:34+00:00",
      "generator": {
        "date": "2024-11-22T03:26:34+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2009:1540",
      "initial_release_date": "2009-11-03T18:21:00+00:00",
      "revision_history": [
        {
          "date": "2009-11-03T18:21:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2009-11-03T13:21:07+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-22T03:26:34+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "MRG Realtime for RHEL 5 Server",
                "product": {
                  "name": "MRG Realtime for RHEL 5 Server",
                  "product_id": "5Server-MRG-Realtime-1.0",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_mrg:1::el5"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise MRG for RHEL-5"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
                "product": {
                  "name": "kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
                  "product_id": "kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@2.6.24.7-137.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
                "product": {
                  "name": "kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
                  "product_id": "kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@2.6.24.7-137.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
                "product": {
                  "name": "kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
                  "product_id": "kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug@2.6.24.7-137.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
                "product": {
                  "name": "kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
                  "product_id": "kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-devel@2.6.24.7-137.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
                "product": {
                  "name": "kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
                  "product_id": "kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-vanilla@2.6.24.7-137.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
                "product": {
                  "name": "kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
                  "product_id": "kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@2.6.24.7-137.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-0:2.6.24.7-137.el5rt.i686",
                "product": {
                  "name": "kernel-rt-0:2.6.24.7-137.el5rt.i686",
                  "product_id": "kernel-rt-0:2.6.24.7-137.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-137.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
                "product": {
                  "name": "kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
                  "product_id": "kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace@2.6.24.7-137.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
                "product": {
                  "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
                  "product_id": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@2.6.24.7-137.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
                "product": {
                  "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
                  "product_id": "kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@2.6.24.7-137.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
                "product": {
                  "name": "kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
                  "product_id": "kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common@2.6.24.7-137.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
                "product": {
                  "name": "kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
                  "product_id": "kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@2.6.24.7-137.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
                "product": {
                  "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
                  "product_id": "kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@2.6.24.7-137.el5rt?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
                  "product_id": "kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@2.6.24.7-137.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64",
                  "product_id": "kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@2.6.24.7-137.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
                  "product_id": "kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug@2.6.24.7-137.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
                  "product_id": "kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-devel@2.6.24.7-137.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
                  "product_id": "kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-vanilla@2.6.24.7-137.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
                  "product_id": "kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@2.6.24.7-137.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
                  "product_id": "kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-137.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
                  "product_id": "kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace@2.6.24.7-137.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
                  "product_id": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@2.6.24.7-137.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
                  "product_id": "kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@2.6.24.7-137.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
                  "product_id": "kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common@2.6.24.7-137.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
                  "product_id": "kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@2.6.24.7-137.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
                  "product_id": "kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@2.6.24.7-137.el5rt?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
                "product": {
                  "name": "kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
                  "product_id": "kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-doc@2.6.24.7-137.el5rt?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-0:2.6.24.7-137.el5rt.src",
                "product": {
                  "name": "kernel-rt-0:2.6.24.7-137.el5rt.src",
                  "product_id": "kernel-rt-0:2.6.24.7-137.el5rt.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-137.el5rt?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:2.6.24.7-137.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686"
        },
        "product_reference": "kernel-rt-0:2.6.24.7-137.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:2.6.24.7-137.el5rt.src as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src"
        },
        "product_reference": "kernel-rt-0:2.6.24.7-137.el5rt.src",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:2.6.24.7-137.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-0:2.6.24.7-137.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686"
        },
        "product_reference": "kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686"
        },
        "product_reference": "kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686"
        },
        "product_reference": "kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686"
        },
        "product_reference": "kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686"
        },
        "product_reference": "kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-0:2.6.24.7-137.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686"
        },
        "product_reference": "kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch"
        },
        "product_reference": "kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-0:2.6.24.7-137.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686"
        },
        "product_reference": "kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686"
        },
        "product_reference": "kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686"
        },
        "product_reference": "kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686"
        },
        "product_reference": "kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686"
        },
        "product_reference": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686"
        },
        "product_reference": "kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2009-1895",
      "discovery_date": "2009-06-30T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "511171"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The personality subsystem in the Linux kernel before 2.6.31-rc3 has a PER_CLEAR_ON_SETID setting that does not clear the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags when executing a setuid or setgid program, which makes it easier for local users to leverage the details of memory usage to (1) conduct NULL pointer dereference attacks, (2) bypass the mmap_min_addr protection mechanism, or (3) defeat address space layout randomization (ASLR).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: personality: fix PER_CLEAR_ON_SETID",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1895"
        },
        {
          "category": "external",
          "summary": "RHBZ#511171",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=511171"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1895",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1895"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1895",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1895"
        }
      ],
      "release_date": "2009-06-26T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T18:21:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1540"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: personality: fix PER_CLEAR_ON_SETID"
    },
    {
      "cve": "CVE-2009-2691",
      "discovery_date": "2009-08-07T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "516171"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The mm_for_maps function in fs/proc/base.c in the Linux kernel 2.6.30.4 and earlier allows local users to read (1) maps and (2) smaps files under proc/ via vectors related to ELF loading, a setuid process, and a race condition.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: /proc/$pid/maps visible during initial setuid ELF loading",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "We currently have no plans to fix this flaw in Red Hat Enterprise Linux 3, 4, and 5 as it is not possible to trigger the information leak if the suid_dumpable tunable is set to zero (which is the default).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-2691"
        },
        {
          "category": "external",
          "summary": "RHBZ#516171",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=516171"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2691",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-2691"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2691",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2691"
        }
      ],
      "release_date": "2009-07-10T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T18:21:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1540"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: /proc/$pid/maps visible during initial setuid ELF loading"
    },
    {
      "cve": "CVE-2009-2695",
      "discovery_date": "2009-08-17T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "517830"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The Linux kernel before 2.6.31-rc7 does not properly prevent mmap operations that target page zero and other low memory addresses, which allows local users to gain privileges by exploiting NULL pointer dereference vulnerabilities, related to (1) the default configuration of the allow_unconfined_mmap_low boolean in SELinux on Red Hat Enterprise Linux (RHEL) 5, (2) an error that causes allow_unconfined_mmap_low to be ignored in the unconfined_t domain, (3) lack of a requirement for the CAP_SYS_RAWIO capability for these mmap operations, and (4) interaction between the mmap_min_addr protection mechanism and certain application programs.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: SELinux and mmap_min_addr",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-2695"
        },
        {
          "category": "external",
          "summary": "RHBZ#517830",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=517830"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2695",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-2695"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2695",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2695"
        }
      ],
      "release_date": "2009-07-31T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T18:21:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1540"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: SELinux and mmap_min_addr"
    },
    {
      "cve": "CVE-2009-2849",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2009-08-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "518132"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The md driver (drivers/md/md.c) in the Linux kernel before 2.6.30.2 might allow local users to cause a denial of service (NULL pointer dereference) via vectors related to \"suspend_* sysfs attributes\" and the (1) suspend_lo_store or (2) suspend_hi_store functions.  NOTE: this is only a vulnerability when sysfs is writable by an attacker.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: md: NULL pointer deref when accessing suspend_* sysfs attributes",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The flaw was introduced in kernel version 2.6.17-rc1. The Linux kernel as shipped with Red Hat Enterprise Linux 3, and 4 are not affected by this issue.\n\nA future kernel update for Red Hat Enterprise Linux 5 will address this flaw.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-2849"
        },
        {
          "category": "external",
          "summary": "RHBZ#518132",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=518132"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2849",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-2849"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2849",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2849"
        }
      ],
      "release_date": "2009-07-01T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T18:21:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1540"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "HIGH",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.2,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: md: NULL pointer deref when accessing suspend_* sysfs attributes"
    },
    {
      "cve": "CVE-2009-2910",
      "discovery_date": "2009-10-01T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "526788"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "arch/x86/ia32/ia32entry.S in the Linux kernel before 2.6.31.4 on the x86_64 platform does not clear certain kernel registers before a return to user mode, which allows local users to read register values from an earlier process by switching an ia32 process to 64-bit mode.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: x86_64 32 bit process register leak",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is not planned to be fixed in Red Hat Enterprise Linux 3, due to this product being in Production 3 of its maintenance life-cycle, where only qualified security errata of important and critical impact are addressed.\n\nFor further information about Errata Support Policy, visit: https://access.redhat.com/support/policy/updates/errata/",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-2910"
        },
        {
          "category": "external",
          "summary": "RHBZ#526788",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=526788"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2910",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-2910"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2910",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2910"
        }
      ],
      "release_date": "2009-10-01T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T18:21:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1540"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: x86_64 32 bit process register leak"
    },
    {
      "cve": "CVE-2009-3002",
      "discovery_date": "2009-08-26T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "519305"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The Linux kernel before 2.6.31-rc7 does not initialize certain data structures within getname functions, which allows local users to read the contents of some kernel memory locations by calling getsockname on (1) an AF_APPLETALK socket, related to the atalk_getname function in net/appletalk/ddp.c; (2) an AF_IRDA socket, related to the irda_getname function in net/irda/af_irda.c; (3) an AF_ECONET socket, related to the econet_getname function in net/econet/af_econet.c; (4) an AF_NETROM socket, related to the nr_getname function in net/netrom/af_netrom.c; (5) an AF_ROSE socket, related to the rose_getname function in net/rose/af_rose.c; or (6) a raw CAN socket, related to the raw_getname function in net/can/raw.c.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: numerous getname() infoleaks",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "CVE-2009-3002 describes a collection of similar information leaks that affect numerous networking protocols.\n\nThe Linux kernel as shipped with Red Hat Enterprise Linux 4 and 5 did not enable support for the AppleTalk DDP protocol, and therefore were not affected by issue (1).\n\nThe Linux kernel as shipped with Red Hat Enterprise Linux 4, 5 and Red Hat Enterprise MRG did not enable support for IrDA sockets, and therefore were not affected by issue (2).\n\nThe Linux kernel as shipped with Red Hat Enterprise Linux 3, 4, 5, and Red Hat Enterprise MRG did not enable support for the Acorn Econet and AUN protocols, and therefore were not affected by issue (3).\n\nThe Linux kernel as shipped with Red Hat Enterprise Linux 4, 5, and Red Hat Enterprise MRG did not enable support for the NET/ROM and ROSE protocols, and therefore were not affected by issues (4) and (5).\n\nThe raw_getname() leak was introduced in the Linux kernel version 2.6.25-rc1. The Linux kernel as shipped with Red Hat Enterprise Linux 3, 4, 5, and Red Hat Enterprise MRG therefore were not affected by issue (6).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3002"
        },
        {
          "category": "external",
          "summary": "RHBZ#519305",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=519305"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3002",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3002"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3002",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3002"
        }
      ],
      "release_date": "2009-08-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T18:21:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1540"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: numerous getname() infoleaks"
    },
    {
      "cve": "CVE-2009-3228",
      "cwe": {
        "id": "CWE-401",
        "name": "Missing Release of Memory after Effective Lifetime"
      },
      "discovery_date": "2009-09-03T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "520990"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The tc_fill_tclass function in net/sched/sch_api.c in the tc subsystem in the Linux kernel 2.4.x before 2.4.37.6 and 2.6.x before 2.6.31-rc9 does not initialize certain (1) tcm__pad1 and (2) tcm__pad2 structure members, which might allow local users to obtain sensitive information from kernel memory via unspecified vectors.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: tc: uninitialised kernel memory leak",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3228"
        },
        {
          "category": "external",
          "summary": "RHBZ#520990",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=520990"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3228",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3228"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3228",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3228"
        }
      ],
      "release_date": "2009-09-02T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T18:21:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1540"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: tc: uninitialised kernel memory leak"
    },
    {
      "cve": "CVE-2009-3547",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2009-10-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "530490"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Multiple race conditions in fs/pipe.c in the Linux kernel before 2.6.32-rc6 allow local users to cause a denial of service (NULL pointer dereference and system crash) or gain privileges by attempting to open an anonymous pipe via a /proc/*/fd/ pathname.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: fs: pipe.c null pointer dereference",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3547"
        },
        {
          "category": "external",
          "summary": "RHBZ#530490",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=530490"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3547",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3547"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3547",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3547"
        }
      ],
      "release_date": "2009-10-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T18:21:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1540"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: fs: pipe.c null pointer dereference"
    },
    {
      "cve": "CVE-2009-3612",
      "discovery_date": "2009-10-14T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "528868"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The tcf_fill_node function in net/sched/cls_api.c in the netlink subsystem in the Linux kernel 2.6.x before 2.6.32-rc5, and 2.4.37.6 and earlier, does not initialize a certain tcm__pad2 structure member, which might allow local users to obtain sensitive information from kernel memory via unspecified vectors.  NOTE: this issue exists because of an incomplete fix for CVE-2005-4881.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: tcf_fill_node() infoleak due to typo in 9ef1d4c7",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is not planned to be fixed in Red Hat Enterprise Linux 3 due to this product being in Production 3 of its maintenance life-cycle, where only qualified security errata of important or critical impact are addressed.\n\nFor further information about the Errata Support Policy, visit: https://access.redhat.com/support/policy/updates/errata/",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3612"
        },
        {
          "category": "external",
          "summary": "RHBZ#528868",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=528868"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3612",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3612"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3612",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3612"
        }
      ],
      "release_date": "2009-10-08T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T18:21:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1540"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: tcf_fill_node() infoleak due to typo in 9ef1d4c7"
    },
    {
      "cve": "CVE-2009-3613",
      "discovery_date": "2009-10-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "529137"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The swiotlb functionality in the r8169 driver in drivers/net/r8169.c in the Linux kernel before 2.6.27.22 allows remote attackers to cause a denial of service (IOMMU space exhaustion and system crash) by using jumbo frames for a large amount of network traffic, as demonstrated by a flood ping.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: flood ping cause out-of-iommu error and panic when mtu larger than 1500",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3613"
        },
        {
          "category": "external",
          "summary": "RHBZ#529137",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529137"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3613",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3613"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3613",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3613"
        }
      ],
      "release_date": "2007-11-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T18:21:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1540"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: flood ping cause out-of-iommu error and panic when mtu larger than 1500"
    },
    {
      "cve": "CVE-2009-3620",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2009-10-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "529597"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The ATI Rage 128 (aka r128) driver in the Linux kernel before 2.6.31-git11 does not properly verify Concurrent Command Engine (CCE) state initialization, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly gain privileges via unspecified ioctl calls.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: r128 IOCTL NULL pointer dereferences when CCE state is uninitialised",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3620"
        },
        {
          "category": "external",
          "summary": "RHBZ#529597",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529597"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3620",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3620"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3620",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3620"
        }
      ],
      "release_date": "2009-08-30T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T18:21:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1540"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.9,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: r128 IOCTL NULL pointer dereferences when CCE state is uninitialised"
    },
    {
      "cve": "CVE-2009-3621",
      "discovery_date": "2009-10-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "529626"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "net/unix/af_unix.c in the Linux kernel 2.6.31.4 and earlier allows local users to cause a denial of service (system hang) by creating an abstract-namespace AF_UNIX listening socket, performing a shutdown operation on this socket, and then performing a series of connect operations to this socket.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: AF_UNIX: Fix deadlock on connecting to shutdown socket",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is not planned to be fixed in Red Hat Enterprise Linux 3, due to this product being in Production 3 of its maintenance life-cycle, where only qualified security errata of important or critical impact are addressed.\n\nFor further information about Errata Support Policy, visit: https://access.redhat.com/support/policy/updates/errata/",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3621"
        },
        {
          "category": "external",
          "summary": "RHBZ#529626",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529626"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3621",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3621"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3621",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3621"
        }
      ],
      "release_date": "2009-10-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T18:21:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1540"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.9,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: AF_UNIX: Fix deadlock on connecting to shutdown socket"
    }
  ]
}
  rhsa-2010:0046
Vulnerability from csaf_redhat
Published
2010-01-19 23:30
    Modified
2025-10-09 12:58
    Summary
Red Hat Security Advisory: kernel security and bug fix update
    Notes
Topic
Updated kernel packages that fix multiple security issues and several bugs
are now available for Red Hat Enterprise Linux 5.
This update has been rated as having important security impact by the Red
Hat Security Response Team.
    Details
The kernel packages contain the Linux kernel, the core of any Linux
operating system.
Security fixes:
* an array index error was found in the gdth driver. A local user could
send a specially-crafted IOCTL request that would cause a denial of service
or, possibly, privilege escalation. (CVE-2009-3080, Important)
* a flaw was found in the FUSE implementation. When a system is low on
memory, fuse_put_request() could dereference an invalid pointer, possibly
leading to a local denial of service or privilege escalation.
(CVE-2009-4021, Important)
* Tavis Ormandy discovered a deficiency in the fasync_helper()
implementation. This could allow a local, unprivileged user to leverage a
use-after-free of locked, asynchronous file descriptors to cause a denial
of service or privilege escalation. (CVE-2009-4141, Important)
* the Parallels Virtuozzo Containers team reported the RHSA-2009:1243
update introduced two flaws in the routing implementation. If an attacker
was able to cause a large enough number of collisions in the routing hash
table (via specially-crafted packets) for the emergency route flush to
trigger, a deadlock could occur. Secondly, if the kernel routing cache was
disabled, an uninitialized pointer would be left behind after a route
lookup, leading to a kernel panic. (CVE-2009-4272, Important)
* the RHSA-2009:0225 update introduced a rewrite attack flaw in the
do_coredump() function. A local attacker able to guess the file name a
process is going to dump its core to, prior to the process crashing, could
use this flaw to append data to the dumped core file. This issue only
affects systems that have "/proc/sys/fs/suid_dumpable" set to 2 (the
default value is 0). (CVE-2006-6304, Moderate)
The fix for CVE-2006-6304 changes the expected behavior: With suid_dumpable
set to 2, the core file will not be recorded if the file already exists.
For example, core files will not be overwritten on subsequent crashes of
processes whose core files map to the same name.
* an information leak was found in the Linux kernel. On AMD64 systems,
32-bit processes could access and read certain 64-bit registers by
temporarily switching themselves to 64-bit mode. (CVE-2009-2910, Moderate)
* the RHBA-2008:0314 update introduced N_Port ID Virtualization (NPIV)
support in the qla2xxx driver, resulting in two new sysfs pseudo files,
"/sys/class/scsi_host/[a qla2xxx host]/vport_create" and "vport_delete".
These two files were world-writable by default, allowing a local user to
change SCSI host attributes. This flaw only affects systems using the
qla2xxx driver and NPIV capable hardware. (CVE-2009-3556, Moderate)
* permission issues were found in the megaraid_sas driver. The "dbg_lvl"
and "poll_mode_io" files on the sysfs file system ("/sys/") had
world-writable permissions. This could allow local, unprivileged users to
change the behavior of the driver. (CVE-2009-3889, CVE-2009-3939, Moderate)
* a NULL pointer dereference flaw was found in the firewire-ohci driver
used for OHCI compliant IEEE 1394 controllers. A local, unprivileged user
with access to /dev/fw* files could issue certain IOCTL calls, causing a
denial of service or privilege escalation. The FireWire modules are
blacklisted by default, and if enabled, only root has access to the files
noted above by default. (CVE-2009-4138, Moderate)
* a buffer overflow flaw was found in the hfs_bnode_read() function in the
HFS file system implementation. This could lead to a denial of service if a
user browsed a specially-crafted HFS file system, for example, by running
"ls". (CVE-2009-4020, Low)
Bug fix documentation for this update will be available shortly from
www.redhat.com/docs/en-US/errata/RHSA-2010-0046/Kernel_Security_Update/
index.html
Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.
    Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
    {
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated kernel packages that fix multiple security issues and several bugs\nare now available for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nSecurity fixes:\n\n* an array index error was found in the gdth driver. A local user could\nsend a specially-crafted IOCTL request that would cause a denial of service\nor, possibly, privilege escalation. (CVE-2009-3080, Important)\n\n* a flaw was found in the FUSE implementation. When a system is low on\nmemory, fuse_put_request() could dereference an invalid pointer, possibly\nleading to a local denial of service or privilege escalation.\n(CVE-2009-4021, Important)\n\n* Tavis Ormandy discovered a deficiency in the fasync_helper()\nimplementation. This could allow a local, unprivileged user to leverage a\nuse-after-free of locked, asynchronous file descriptors to cause a denial\nof service or privilege escalation. (CVE-2009-4141, Important)\n\n* the Parallels Virtuozzo Containers team reported the RHSA-2009:1243\nupdate introduced two flaws in the routing implementation. If an attacker\nwas able to cause a large enough number of collisions in the routing hash\ntable (via specially-crafted packets) for the emergency route flush to\ntrigger, a deadlock could occur. Secondly, if the kernel routing cache was\ndisabled, an uninitialized pointer would be left behind after a route\nlookup, leading to a kernel panic. (CVE-2009-4272, Important)\n\n* the RHSA-2009:0225 update introduced a rewrite attack flaw in the\ndo_coredump() function. A local attacker able to guess the file name a\nprocess is going to dump its core to, prior to the process crashing, could\nuse this flaw to append data to the dumped core file. This issue only\naffects systems that have \"/proc/sys/fs/suid_dumpable\" set to 2 (the\ndefault value is 0). (CVE-2006-6304, Moderate)\n\nThe fix for CVE-2006-6304 changes the expected behavior: With suid_dumpable\nset to 2, the core file will not be recorded if the file already exists.\nFor example, core files will not be overwritten on subsequent crashes of\nprocesses whose core files map to the same name.\n\n* an information leak was found in the Linux kernel. On AMD64 systems,\n32-bit processes could access and read certain 64-bit registers by\ntemporarily switching themselves to 64-bit mode. (CVE-2009-2910, Moderate)\n\n* the RHBA-2008:0314 update introduced N_Port ID Virtualization (NPIV)\nsupport in the qla2xxx driver, resulting in two new sysfs pseudo files,\n\"/sys/class/scsi_host/[a qla2xxx host]/vport_create\" and \"vport_delete\".\nThese two files were world-writable by default, allowing a local user to\nchange SCSI host attributes. This flaw only affects systems using the\nqla2xxx driver and NPIV capable hardware. (CVE-2009-3556, Moderate)\n\n* permission issues were found in the megaraid_sas driver. The \"dbg_lvl\"\nand \"poll_mode_io\" files on the sysfs file system (\"/sys/\") had\nworld-writable permissions. This could allow local, unprivileged users to\nchange the behavior of the driver. (CVE-2009-3889, CVE-2009-3939, Moderate)\n\n* a NULL pointer dereference flaw was found in the firewire-ohci driver\nused for OHCI compliant IEEE 1394 controllers. A local, unprivileged user\nwith access to /dev/fw* files could issue certain IOCTL calls, causing a\ndenial of service or privilege escalation. The FireWire modules are\nblacklisted by default, and if enabled, only root has access to the files\nnoted above by default. (CVE-2009-4138, Moderate)\n\n* a buffer overflow flaw was found in the hfs_bnode_read() function in the\nHFS file system implementation. This could lead to a denial of service if a\nuser browsed a specially-crafted HFS file system, for example, by running\n\"ls\". (CVE-2009-4020, Low)\n\nBug fix documentation for this update will be available shortly from\nwww.redhat.com/docs/en-US/errata/RHSA-2010-0046/Kernel_Security_Update/\nindex.html\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2010:0046",
        "url": "https://access.redhat.com/errata/RHSA-2010:0046"
      },
      {
        "category": "external",
        "summary": "543448",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=543448"
      },
      {
        "category": "external",
        "summary": "544978",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=544978"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "http://kbase.redhat.com/faq/docs/DOC-20536",
        "url": "http://kbase.redhat.com/faq/docs/DOC-20536"
      },
      {
        "category": "external",
        "summary": "526068",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=526068"
      },
      {
        "category": "external",
        "summary": "526788",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=526788"
      },
      {
        "category": "external",
        "summary": "537027",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=537027"
      },
      {
        "category": "external",
        "summary": "537177",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=537177"
      },
      {
        "category": "external",
        "summary": "537273",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=537273"
      },
      {
        "category": "external",
        "summary": "538734",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=538734"
      },
      {
        "category": "external",
        "summary": "539414",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539414"
      },
      {
        "category": "external",
        "summary": "539686",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539686"
      },
      {
        "category": "external",
        "summary": "540736",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=540736"
      },
      {
        "category": "external",
        "summary": "540896",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=540896"
      },
      {
        "category": "external",
        "summary": "542582",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=542582"
      },
      {
        "category": "external",
        "summary": "545411",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=545411"
      },
      {
        "category": "external",
        "summary": "547236",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=547236"
      },
      {
        "category": "external",
        "summary": "547521",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=547521"
      },
      {
        "category": "external",
        "summary": "547530",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=547530"
      },
      {
        "category": "external",
        "summary": "547906",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=547906"
      },
      {
        "category": "external",
        "summary": "548370",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=548370"
      },
      {
        "category": "external",
        "summary": "549905",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=549905"
      },
      {
        "category": "external",
        "summary": "549906",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=549906"
      },
      {
        "category": "external",
        "summary": "549907",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=549907"
      },
      {
        "category": "external",
        "summary": "549908",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=549908"
      },
      {
        "category": "external",
        "summary": "550968",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=550968"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0046.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security and bug fix update",
    "tracking": {
      "current_release_date": "2025-10-09T12:58:02+00:00",
      "generator": {
        "date": "2025-10-09T12:58:02+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2010:0046",
      "initial_release_date": "2010-01-19T23:30:00+00:00",
      "revision_history": [
        {
          "date": "2010-01-19T23:30:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2010-01-19T18:36:43+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T12:58:02+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
                "product": {
                  "name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
                  "product_id": "5Client",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:5::client"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux (v. 5 server)",
                "product": {
                  "name": "Red Hat Enterprise Linux (v. 5 server)",
                  "product_id": "5Server",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:5::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-PAE-0:2.6.18-164.11.1.el5.i686",
                "product": {
                  "name": "kernel-PAE-0:2.6.18-164.11.1.el5.i686",
                  "product_id": "kernel-PAE-0:2.6.18-164.11.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-164.11.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-164.11.1.el5.i686",
                "product": {
                  "name": "kernel-devel-0:2.6.18-164.11.1.el5.i686",
                  "product_id": "kernel-devel-0:2.6.18-164.11.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-164.11.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
                "product": {
                  "name": "kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
                  "product_id": "kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-164.11.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-0:2.6.18-164.11.1.el5.i686",
                "product": {
                  "name": "kernel-xen-0:2.6.18-164.11.1.el5.i686",
                  "product_id": "kernel-xen-0:2.6.18-164.11.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-164.11.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
                  "product_id": "kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-164.11.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
                "product": {
                  "name": "kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
                  "product_id": "kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-164.11.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-164.11.1.el5.i686",
                "product": {
                  "name": "kernel-0:2.6.18-164.11.1.el5.i686",
                  "product_id": "kernel-0:2.6.18-164.11.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-164.11.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
                  "product_id": "kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-164.11.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
                "product": {
                  "name": "kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
                  "product_id": "kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-164.11.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-164.11.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-164.11.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
                "product": {
                  "name": "kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
                  "product_id": "kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-164.11.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-164.11.1.el5.i686",
                "product": {
                  "name": "kernel-debug-0:2.6.18-164.11.1.el5.i686",
                  "product_id": "kernel-debug-0:2.6.18-164.11.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-164.11.1.el5?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-164.11.1.el5.i386",
                "product": {
                  "name": "kernel-headers-0:2.6.18-164.11.1.el5.i386",
                  "product_id": "kernel-headers-0:2.6.18-164.11.1.el5.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-164.11.1.el5?arch=i386"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i386"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
                "product": {
                  "name": "kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
                  "product_id": "kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-164.11.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
                "product": {
                  "name": "kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
                  "product_id": "kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-164.11.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
                "product": {
                  "name": "kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
                  "product_id": "kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-164.11.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
                  "product_id": "kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-164.11.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-164.11.1.el5.x86_64",
                "product": {
                  "name": "kernel-0:2.6.18-164.11.1.el5.x86_64",
                  "product_id": "kernel-0:2.6.18-164.11.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-164.11.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
                  "product_id": "kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-164.11.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
                "product": {
                  "name": "kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
                  "product_id": "kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-164.11.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-164.11.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
                "product": {
                  "name": "kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
                  "product_id": "kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-164.11.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-164.11.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
                "product": {
                  "name": "kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
                  "product_id": "kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-164.11.1.el5?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-doc-0:2.6.18-164.11.1.el5.noarch",
                "product": {
                  "name": "kernel-doc-0:2.6.18-164.11.1.el5.noarch",
                  "product_id": "kernel-doc-0:2.6.18-164.11.1.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@2.6.18-164.11.1.el5?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-164.11.1.el5.src",
                "product": {
                  "name": "kernel-0:2.6.18-164.11.1.el5.src",
                  "product_id": "kernel-0:2.6.18-164.11.1.el5.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-164.11.1.el5?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-164.11.1.el5.ia64",
                "product": {
                  "name": "kernel-devel-0:2.6.18-164.11.1.el5.ia64",
                  "product_id": "kernel-devel-0:2.6.18-164.11.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-164.11.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
                "product": {
                  "name": "kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
                  "product_id": "kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-164.11.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-0:2.6.18-164.11.1.el5.ia64",
                "product": {
                  "name": "kernel-xen-0:2.6.18-164.11.1.el5.ia64",
                  "product_id": "kernel-xen-0:2.6.18-164.11.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-164.11.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
                  "product_id": "kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-164.11.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-164.11.1.el5.ia64",
                "product": {
                  "name": "kernel-0:2.6.18-164.11.1.el5.ia64",
                  "product_id": "kernel-0:2.6.18-164.11.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-164.11.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
                  "product_id": "kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-164.11.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
                "product": {
                  "name": "kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
                  "product_id": "kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-164.11.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-164.11.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-164.11.1.el5.ia64",
                "product": {
                  "name": "kernel-headers-0:2.6.18-164.11.1.el5.ia64",
                  "product_id": "kernel-headers-0:2.6.18-164.11.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-164.11.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-164.11.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-164.11.1.el5.ia64",
                "product": {
                  "name": "kernel-debug-0:2.6.18-164.11.1.el5.ia64",
                  "product_id": "kernel-debug-0:2.6.18-164.11.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-164.11.1.el5?arch=ia64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ia64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
                "product": {
                  "name": "kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
                  "product_id": "kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-164.11.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
                "product": {
                  "name": "kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
                  "product_id": "kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-164.11.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
                  "product_id": "kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-164.11.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-164.11.1.el5.ppc64",
                "product": {
                  "name": "kernel-0:2.6.18-164.11.1.el5.ppc64",
                  "product_id": "kernel-0:2.6.18-164.11.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-164.11.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
                "product": {
                  "name": "kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
                  "product_id": "kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-164.11.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
                  "product_id": "kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-164.11.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-164.11.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
                "product": {
                  "name": "kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
                  "product_id": "kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-164.11.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-164.11.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
                "product": {
                  "name": "kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
                  "product_id": "kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-164.11.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
                "product": {
                  "name": "kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
                  "product_id": "kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-164.11.1.el5?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-164.11.1.el5.ppc",
                "product": {
                  "name": "kernel-headers-0:2.6.18-164.11.1.el5.ppc",
                  "product_id": "kernel-headers-0:2.6.18-164.11.1.el5.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-164.11.1.el5?arch=ppc"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-164.11.1.el5.s390x",
                "product": {
                  "name": "kernel-devel-0:2.6.18-164.11.1.el5.s390x",
                  "product_id": "kernel-devel-0:2.6.18-164.11.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-164.11.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
                "product": {
                  "name": "kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
                  "product_id": "kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-164.11.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
                  "product_id": "kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-164.11.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-164.11.1.el5.s390x",
                "product": {
                  "name": "kernel-0:2.6.18-164.11.1.el5.s390x",
                  "product_id": "kernel-0:2.6.18-164.11.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-164.11.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
                "product": {
                  "name": "kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
                  "product_id": "kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-164.11.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
                  "product_id": "kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-164.11.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-164.11.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-164.11.1.el5.s390x",
                "product": {
                  "name": "kernel-headers-0:2.6.18-164.11.1.el5.s390x",
                  "product_id": "kernel-headers-0:2.6.18-164.11.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-164.11.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-164.11.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
                "product": {
                  "name": "kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
                  "product_id": "kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-164.11.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-164.11.1.el5.s390x",
                "product": {
                  "name": "kernel-debug-0:2.6.18-164.11.1.el5.s390x",
                  "product_id": "kernel-debug-0:2.6.18-164.11.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-164.11.1.el5?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-164.11.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-0:2.6.18-164.11.1.el5.i686"
        },
        "product_reference": "kernel-0:2.6.18-164.11.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-164.11.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-0:2.6.18-164.11.1.el5.ia64"
        },
        "product_reference": "kernel-0:2.6.18-164.11.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-164.11.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64"
        },
        "product_reference": "kernel-0:2.6.18-164.11.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-164.11.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-0:2.6.18-164.11.1.el5.s390x"
        },
        "product_reference": "kernel-0:2.6.18-164.11.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-164.11.1.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-0:2.6.18-164.11.1.el5.src"
        },
        "product_reference": "kernel-0:2.6.18-164.11.1.el5.src",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-164.11.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64"
        },
        "product_reference": "kernel-0:2.6.18-164.11.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-0:2.6.18-164.11.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686"
        },
        "product_reference": "kernel-PAE-0:2.6.18-164.11.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686"
        },
        "product_reference": "kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686"
        },
        "product_reference": "kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-164.11.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686"
        },
        "product_reference": "kernel-debug-0:2.6.18-164.11.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-164.11.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64"
        },
        "product_reference": "kernel-debug-0:2.6.18-164.11.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-164.11.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64"
        },
        "product_reference": "kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-164.11.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x"
        },
        "product_reference": "kernel-debug-0:2.6.18-164.11.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-164.11.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64"
        },
        "product_reference": "kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-164.11.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-164.11.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-164.11.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686"
        },
        "product_reference": "kernel-devel-0:2.6.18-164.11.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-164.11.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.18-164.11.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-164.11.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-164.11.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.18-164.11.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-164.11.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.18-164.11.1.el5.noarch as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.18-164.11.1.el5.noarch",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-164.11.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386"
        },
        "product_reference": "kernel-headers-0:2.6.18-164.11.1.el5.i386",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-164.11.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64"
        },
        "product_reference": "kernel-headers-0:2.6.18-164.11.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-164.11.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc"
        },
        "product_reference": "kernel-headers-0:2.6.18-164.11.1.el5.ppc",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-164.11.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64"
        },
        "product_reference": "kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-164.11.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x"
        },
        "product_reference": "kernel-headers-0:2.6.18-164.11.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-164.11.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64"
        },
        "product_reference": "kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:2.6.18-164.11.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64"
        },
        "product_reference": "kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:2.6.18-164.11.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x"
        },
        "product_reference": "kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64"
        },
        "product_reference": "kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64"
        },
        "product_reference": "kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-164.11.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686"
        },
        "product_reference": "kernel-xen-0:2.6.18-164.11.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-164.11.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64"
        },
        "product_reference": "kernel-xen-0:2.6.18-164.11.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-164.11.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64"
        },
        "product_reference": "kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-164.11.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-164.11.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-0:2.6.18-164.11.1.el5.i686"
        },
        "product_reference": "kernel-0:2.6.18-164.11.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-164.11.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-0:2.6.18-164.11.1.el5.ia64"
        },
        "product_reference": "kernel-0:2.6.18-164.11.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-164.11.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64"
        },
        "product_reference": "kernel-0:2.6.18-164.11.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-164.11.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-0:2.6.18-164.11.1.el5.s390x"
        },
        "product_reference": "kernel-0:2.6.18-164.11.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-164.11.1.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-0:2.6.18-164.11.1.el5.src"
        },
        "product_reference": "kernel-0:2.6.18-164.11.1.el5.src",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-164.11.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64"
        },
        "product_reference": "kernel-0:2.6.18-164.11.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-0:2.6.18-164.11.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686"
        },
        "product_reference": "kernel-PAE-0:2.6.18-164.11.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686"
        },
        "product_reference": "kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686"
        },
        "product_reference": "kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-164.11.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686"
        },
        "product_reference": "kernel-debug-0:2.6.18-164.11.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-164.11.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64"
        },
        "product_reference": "kernel-debug-0:2.6.18-164.11.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-164.11.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64"
        },
        "product_reference": "kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-164.11.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x"
        },
        "product_reference": "kernel-debug-0:2.6.18-164.11.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-164.11.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64"
        },
        "product_reference": "kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-164.11.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-164.11.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-164.11.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686"
        },
        "product_reference": "kernel-devel-0:2.6.18-164.11.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-164.11.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.18-164.11.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-164.11.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-164.11.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.18-164.11.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-164.11.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.18-164.11.1.el5.noarch as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.18-164.11.1.el5.noarch",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-164.11.1.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386"
        },
        "product_reference": "kernel-headers-0:2.6.18-164.11.1.el5.i386",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-164.11.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64"
        },
        "product_reference": "kernel-headers-0:2.6.18-164.11.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-164.11.1.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc"
        },
        "product_reference": "kernel-headers-0:2.6.18-164.11.1.el5.ppc",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-164.11.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64"
        },
        "product_reference": "kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-164.11.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x"
        },
        "product_reference": "kernel-headers-0:2.6.18-164.11.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-164.11.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64"
        },
        "product_reference": "kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:2.6.18-164.11.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64"
        },
        "product_reference": "kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:2.6.18-164.11.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x"
        },
        "product_reference": "kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64"
        },
        "product_reference": "kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64"
        },
        "product_reference": "kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-164.11.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686"
        },
        "product_reference": "kernel-xen-0:2.6.18-164.11.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-164.11.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64"
        },
        "product_reference": "kernel-xen-0:2.6.18-164.11.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-164.11.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64"
        },
        "product_reference": "kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-164.11.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2006-6304",
      "discovery_date": "2009-12-04T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "537273"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The do_coredump function in fs/exec.c in the Linux kernel 2.6.19 sets the flag variable to O_EXCL but does not use it, which allows context-dependent attackers to modify arbitrary files via a rewrite attack during a core dump.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use flag in do_coredump()",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 3, 4 and Red Hat Enterprise MRG. Shipped kernels do not include upstream commit d025c9db that introduced the problem.\n\nThis upstream commit was backported in Red Hat Enterprise Linux 5 via RHSA-2009:0225. It was later reported and addressed in Red Hat Enterprise Linux 5 via RHSA-2010:0046.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-0:2.6.18-164.11.1.el5.src",
          "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-0:2.6.18-164.11.1.el5.src",
          "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2006-6304"
        },
        {
          "category": "external",
          "summary": "RHBZ#537273",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=537273"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2006-6304",
          "url": "https://www.cve.org/CVERecord?id=CVE-2006-6304"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-6304",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-6304"
        }
      ],
      "release_date": "2009-11-12T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-01-19T23:30:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.11.1.el5.src",
            "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.11.1.el5.src",
            "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0046"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 1.9,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.11.1.el5.src",
            "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.11.1.el5.src",
            "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use flag in do_coredump()"
    },
    {
      "cve": "CVE-2009-2910",
      "discovery_date": "2009-10-01T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "526788"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "arch/x86/ia32/ia32entry.S in the Linux kernel before 2.6.31.4 on the x86_64 platform does not clear certain kernel registers before a return to user mode, which allows local users to read register values from an earlier process by switching an ia32 process to 64-bit mode.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: x86_64 32 bit process register leak",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is not planned to be fixed in Red Hat Enterprise Linux 3, due to this product being in Production 3 of its maintenance life-cycle, where only qualified security errata of important and critical impact are addressed.\n\nFor further information about Errata Support Policy, visit: https://access.redhat.com/support/policy/updates/errata/",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-0:2.6.18-164.11.1.el5.src",
          "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-0:2.6.18-164.11.1.el5.src",
          "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-2910"
        },
        {
          "category": "external",
          "summary": "RHBZ#526788",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=526788"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2910",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-2910"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2910",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2910"
        }
      ],
      "release_date": "2009-10-01T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-01-19T23:30:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.11.1.el5.src",
            "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.11.1.el5.src",
            "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0046"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.11.1.el5.src",
            "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.11.1.el5.src",
            "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: x86_64 32 bit process register leak"
    },
    {
      "cve": "CVE-2009-3080",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2009-11-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "539414"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Array index error in the gdth_read_event function in drivers/scsi/gdth.c in the Linux kernel before 2.6.32-rc8 allows local users to cause a denial of service or possibly gain privileges via a negative event index in an IOCTL request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: gdth: Prevent negative offsets in ioctl",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-0:2.6.18-164.11.1.el5.src",
          "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-0:2.6.18-164.11.1.el5.src",
          "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3080"
        },
        {
          "category": "external",
          "summary": "RHBZ#539414",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539414"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3080",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3080"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3080",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3080"
        }
      ],
      "release_date": "2009-11-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-01-19T23:30:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.11.1.el5.src",
            "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.11.1.el5.src",
            "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0046"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.11.1.el5.src",
            "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.11.1.el5.src",
            "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: gdth: Prevent negative offsets in ioctl"
    },
    {
      "cve": "CVE-2009-3556",
      "cwe": {
        "id": "CWE-732",
        "name": "Incorrect Permission Assignment for Critical Resource"
      },
      "discovery_date": "2009-11-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "537177"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A certain Red Hat configuration step for the qla2xxx driver in the Linux kernel 2.6.18 on Red Hat Enterprise Linux (RHEL) 5, when N_Port ID Virtualization (NPIV) hardware is used, sets world-writable permissions for the (1) vport_create and (2) vport_delete files under /sys/class/scsi_host/, which allows local users to make arbitrary changes to SCSI host attributes by modifying these files.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: qla2xxx NPIV vport management pseudofiles are world writable",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 3, 4 and Red Hat Enterprise MRG. Shipped kernels do not include upstream commit d025c9db that introduced the problem.\n\nThis upstream commit was backported in Red Hat Enterprise Linux 5 via RHBA-2008:0314 update. Issue was addressed in Red Hat Enterprise Linux 5 via RHSA-2010:0046.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-0:2.6.18-164.11.1.el5.src",
          "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-0:2.6.18-164.11.1.el5.src",
          "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3556"
        },
        {
          "category": "external",
          "summary": "RHBZ#537177",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=537177"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3556",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3556"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3556",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3556"
        }
      ],
      "release_date": "2010-01-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-01-19T23:30:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.11.1.el5.src",
            "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.11.1.el5.src",
            "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0046"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 3.6,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.11.1.el5.src",
            "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.11.1.el5.src",
            "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: qla2xxx NPIV vport management pseudofiles are world writable"
    },
    {
      "cve": "CVE-2009-3889",
      "discovery_date": "2009-11-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "526068"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The dbg_lvl file for the megaraid_sas driver in the Linux kernel before 2.6.27 has world-writable permissions, which allows local users to change the (1) behavior and (2) logging level of the driver by modifying this file.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: megaraid_sas permissions in sysfs",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the version of the Linux kernel as shipped with Red Hat Enterprise Linux 3, as it does not implement the sysfs file system (\"/sys/\"), through which dbg_lvl file is exposed by the megaraid_sas driver.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-0:2.6.18-164.11.1.el5.src",
          "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-0:2.6.18-164.11.1.el5.src",
          "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3889"
        },
        {
          "category": "external",
          "summary": "RHBZ#526068",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=526068"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3889",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3889"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3889",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3889"
        }
      ],
      "release_date": "2009-09-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-01-19T23:30:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.11.1.el5.src",
            "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.11.1.el5.src",
            "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0046"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 3.6,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.11.1.el5.src",
            "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.11.1.el5.src",
            "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: megaraid_sas permissions in sysfs"
    },
    {
      "cve": "CVE-2009-3939",
      "discovery_date": "2009-11-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "526068"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The poll_mode_io file for the megaraid_sas driver in the Linux kernel 2.6.31.6 and earlier has world-writable permissions, which allows local users to change the I/O mode of the driver by modifying this file.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: megaraid_sas permissions in sysfs",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the version of the Linux kernel as shipped with Red Hat Enterprise Linux 3, as it does not implement the sysfs file system (\"/sys/\"), through which poll_mode_io file is exposed by the megaraid_sas driver.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-0:2.6.18-164.11.1.el5.src",
          "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-0:2.6.18-164.11.1.el5.src",
          "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3939"
        },
        {
          "category": "external",
          "summary": "RHBZ#526068",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=526068"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3939",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3939"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3939",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3939"
        }
      ],
      "release_date": "2009-09-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-01-19T23:30:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.11.1.el5.src",
            "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.11.1.el5.src",
            "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0046"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 3.6,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.11.1.el5.src",
            "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.11.1.el5.src",
            "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: megaraid_sas permissions in sysfs"
    },
    {
      "cve": "CVE-2009-4020",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2009-11-24T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "540736"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Stack-based buffer overflow in the hfs subsystem in the Linux kernel 2.6.32 allows remote attackers to have an unspecified impact via a crafted Hierarchical File System (HFS) filesystem, related to the hfs_readdir function in fs/hfs/dir.c.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: hfs buffer overflow",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the version of the Linux kernel as shipped with Red Hat Enterprise MRG as the affected driver is not enabled in this kernel.\n\nRed Hat Enterprise Linux 3 is now in Production 3 of the maintenance life-cycle, https://access.redhat.com/support/policy/updates/errata, and this issue is rated as having low impact, therefore the fix for this issue is not currently planned to be included in the future updates.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-0:2.6.18-164.11.1.el5.src",
          "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-0:2.6.18-164.11.1.el5.src",
          "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-4020"
        },
        {
          "category": "external",
          "summary": "RHBZ#540736",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=540736"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-4020",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-4020"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4020",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4020"
        }
      ],
      "release_date": "2009-12-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-01-19T23:30:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.11.1.el5.src",
            "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.11.1.el5.src",
            "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0046"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "HIGH",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.2,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.11.1.el5.src",
            "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.11.1.el5.src",
            "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: hfs buffer overflow"
    },
    {
      "cve": "CVE-2009-4021",
      "discovery_date": "2009-11-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "538734"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The fuse_direct_io function in fs/fuse/file.c in the fuse subsystem in the Linux kernel before 2.6.32-rc7 might allow attackers to cause a denial of service (invalid pointer dereference and OOPS) via vectors possibly related to a memory-consumption attack.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: fuse: prevent fuse_put_request on invalid pointer",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/CVE-2009-4021\n\nThe Linux kernel packages as shipped with Red Hat Enterprise Linux 3 and 4 do not include support for FUSE, and therefore are not affected by this issue.\n\nA future kernel update for Red Hat Enterprise MRG will address this flaw.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-0:2.6.18-164.11.1.el5.src",
          "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-0:2.6.18-164.11.1.el5.src",
          "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-4021"
        },
        {
          "category": "external",
          "summary": "RHBZ#538734",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=538734"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-4021",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-4021"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4021",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4021"
        }
      ],
      "release_date": "2009-10-22T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-01-19T23:30:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.11.1.el5.src",
            "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.11.1.el5.src",
            "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0046"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "SINGLE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.6,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.11.1.el5.src",
            "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.11.1.el5.src",
            "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: fuse: prevent fuse_put_request on invalid pointer"
    },
    {
      "cve": "CVE-2009-4138",
      "discovery_date": "2009-12-14T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "547236"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "drivers/firewire/ohci.c in the Linux kernel before 2.6.32-git9, when packet-per-buffer mode is used, allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unknown other impact via an unspecified ioctl associated with receiving an ISO packet that contains zero in the payload-length field.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: firewire: ohci: handle receive packets with a data length of zero",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/CVE-2009-4138\n\nThe Linux kernel packages as shipped with Red Hat Enterprise Linux 3 and 4 have a different (and older) implementation of the driver for OHCI 1394 controllers, which is not affected by this issue.\n\nA future kernel update for Red Hat Enterprise MRG will address this flaw.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-0:2.6.18-164.11.1.el5.src",
          "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-0:2.6.18-164.11.1.el5.src",
          "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-4138"
        },
        {
          "category": "external",
          "summary": "RHBZ#547236",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=547236"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-4138",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-4138"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4138",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4138"
        }
      ],
      "release_date": "2009-12-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-01-19T23:30:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.11.1.el5.src",
            "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.11.1.el5.src",
            "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0046"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "HIGH",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.0,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:H/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.11.1.el5.src",
            "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.11.1.el5.src",
            "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: firewire: ohci: handle receive packets with a data length of zero"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Tavis Ormandy"
          ],
          "organization": "Google Security Team"
        }
      ],
      "cve": "CVE-2009-4141",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2009-12-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "547906"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Use-after-free vulnerability in the fasync_helper function in fs/fcntl.c in the Linux kernel before 2.6.33-rc4-git1 allows local users to gain privileges via vectors that include enabling O_ASYNC (aka FASYNC or FIOASYNC) on a locked file, and then closing this file.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: create_elf_tables can leave urandom in a bad state",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 3, 4 and Red Hat Enterprise MRG. Shipped kernels do not include upstream commit 233e70f4 that introduced the problem.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-0:2.6.18-164.11.1.el5.src",
          "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-0:2.6.18-164.11.1.el5.src",
          "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-4141"
        },
        {
          "category": "external",
          "summary": "RHBZ#547906",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=547906"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-4141",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-4141"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4141",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4141"
        }
      ],
      "release_date": "2009-12-16T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-01-19T23:30:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.11.1.el5.src",
            "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.11.1.el5.src",
            "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0046"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.11.1.el5.src",
            "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.11.1.el5.src",
            "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: create_elf_tables can leave urandom in a bad state"
    },
    {
      "cve": "CVE-2009-4272",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2009-12-08T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "545411"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A certain Red Hat patch for net/ipv4/route.c in the Linux kernel 2.6.18 on Red Hat Enterprise Linux (RHEL) 5 allows remote attackers to cause a denial of service (deadlock) via crafted packets that force collisions in the IPv4 routing hash table, and trigger a routing \"emergency\" in which a hash chain is too long.  NOTE: this is related to an issue in the Linux kernel before 2.6.31, when the kernel routing cache is disabled, involving an uninitialized pointer and a panic.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: emergency route cache flushing leads to node deadlock",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 3, 4 and Red Hat Enterprise MRG. Shipped kernels do not include upstream commits c6153b5b and 1080d709 that introduced the problem.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-0:2.6.18-164.11.1.el5.src",
          "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-0:2.6.18-164.11.1.el5.src",
          "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-4272"
        },
        {
          "category": "external",
          "summary": "RHBZ#545411",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=545411"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-4272",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-4272"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4272",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4272"
        }
      ],
      "release_date": "2010-01-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-01-19T23:30:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.11.1.el5.src",
            "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.11.1.el5.src",
            "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0046"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.8,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.11.1.el5.src",
            "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.11.1.el5.src",
            "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: emergency route cache flushing leads to node deadlock"
    }
  ]
}
  rhsa-2009_1671
Vulnerability from csaf_redhat
Published
2009-12-15 17:12
    Modified
2024-11-22 03:26
    Summary
Red Hat Security Advisory: kernel security and bug fix update
    Notes
Topic
Updated kernel packages that fix multiple security issues and several bugs
are now available for Red Hat Enterprise Linux 4.
This update has been rated as having important security impact by the Red
Hat Security Response Team.
    Details
The kernel packages contain the Linux kernel, the core of any Linux
operating system.
This update fixes the following security issues:
* a flaw was found in the Realtek r8169 Ethernet driver in the Linux
kernel. pci_unmap_single() presented a memory leak that could lead to IOMMU
space exhaustion and a system crash. An attacker on the local network could
trigger this flaw by using jumbo frames for large amounts of network
traffic. (CVE-2009-3613, Important)
* NULL pointer dereference flaws were found in the r128 driver in the Linux
kernel. Checks to test if the Concurrent Command Engine state was
initialized were missing in private IOCTL functions. An attacker could use
these flaws to cause a local denial of service or escalate their
privileges. (CVE-2009-3620, Important)
* an information leak was found in the Linux kernel. On AMD64 systems,
32-bit processes could access and read certain 64-bit registers by
temporarily switching themselves to 64-bit mode. (CVE-2009-2910, Moderate)
* the unix_stream_connect() function in the Linux kernel did not check if a
UNIX domain socket was in the shutdown state. This could lead to a
deadlock. A local, unprivileged user could use this flaw to cause a denial
of service. (CVE-2009-3621, Moderate)
This update also fixes the following bugs:
* an iptables rule with the recent module and a hit count value greater
than the ip_pkt_list_tot parameter (the default is 20), did not have any
effect over packets, as the hit count could not be reached. (BZ#529306)
* in environments that use dual-controller storage devices with the cciss
driver, Device-Mapper Multipath maps could not be detected and configured,
due to the cciss driver not exporting the bus attribute via sysfs. This
attribute is now exported. (BZ#529309)
* the kernel crashed with a divide error when a certain joystick was
attached. (BZ#532027)
* a bug in the mptctl_do_mpt_command() function in the mpt driver may have
resulted in crashes during boot on i386 systems with certain adapters using
the mpt driver, and also running the hugemem kernel. (BZ#533798)
* on certain hardware, the igb driver was unable to detect link statuses
correctly. This may have caused problems for network bonding, such as
failover not occurring. (BZ#534105)
* the RHSA-2009:1024 update introduced a regression. After updating to Red
Hat Enterprise Linux 4.8 and rebooting, network links often failed to be
brought up for interfaces using the forcedeth driver. "no link during
initialization" messages may have been logged. (BZ#534112)
* the RHSA-2009:1024 update introduced a second regression. On certain
systems, PS/2 keyboards failed to work. (BZ#537344)
* a bug in checksum offload calculations could have crashed the bnx2x
firmware when the iptable_nat module was loaded, causing network traffic
to stop. (BZ#537013)
* a check has been added to the IPv4 code to make sure that the routing
table data structure, rt, is not NULL, to help prevent future bugs in
functions that call ip_append_data() from being exploitable. (BZ#537016)
* possible kernel pointer dereferences on systems with several NFS mounts
(a mixture of "-o lock" and "-o nolock"), which in rare cases may have
caused a system crash, have been resolved. (BZ#537017)
Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.
    Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
    {
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated kernel packages that fix multiple security issues and several bugs\nare now available for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues:\n\n* a flaw was found in the Realtek r8169 Ethernet driver in the Linux\nkernel. pci_unmap_single() presented a memory leak that could lead to IOMMU\nspace exhaustion and a system crash. An attacker on the local network could\ntrigger this flaw by using jumbo frames for large amounts of network\ntraffic. (CVE-2009-3613, Important)\n\n* NULL pointer dereference flaws were found in the r128 driver in the Linux\nkernel. Checks to test if the Concurrent Command Engine state was\ninitialized were missing in private IOCTL functions. An attacker could use\nthese flaws to cause a local denial of service or escalate their\nprivileges. (CVE-2009-3620, Important)\n\n* an information leak was found in the Linux kernel. On AMD64 systems,\n32-bit processes could access and read certain 64-bit registers by\ntemporarily switching themselves to 64-bit mode. (CVE-2009-2910, Moderate)\n\n* the unix_stream_connect() function in the Linux kernel did not check if a\nUNIX domain socket was in the shutdown state. This could lead to a\ndeadlock. A local, unprivileged user could use this flaw to cause a denial\nof service. (CVE-2009-3621, Moderate)\n\nThis update also fixes the following bugs:\n\n* an iptables rule with the recent module and a hit count value greater\nthan the ip_pkt_list_tot parameter (the default is 20), did not have any\neffect over packets, as the hit count could not be reached. (BZ#529306)\n\n* in environments that use dual-controller storage devices with the cciss\ndriver, Device-Mapper Multipath maps could not be detected and configured,\ndue to the cciss driver not exporting the bus attribute via sysfs. This\nattribute is now exported. (BZ#529309)\n\n* the kernel crashed with a divide error when a certain joystick was\nattached. (BZ#532027)\n\n* a bug in the mptctl_do_mpt_command() function in the mpt driver may have\nresulted in crashes during boot on i386 systems with certain adapters using\nthe mpt driver, and also running the hugemem kernel. (BZ#533798)\n\n* on certain hardware, the igb driver was unable to detect link statuses\ncorrectly. This may have caused problems for network bonding, such as\nfailover not occurring. (BZ#534105)\n\n* the RHSA-2009:1024 update introduced a regression. After updating to Red\nHat Enterprise Linux 4.8 and rebooting, network links often failed to be\nbrought up for interfaces using the forcedeth driver. \"no link during\ninitialization\" messages may have been logged. (BZ#534112)\n\n* the RHSA-2009:1024 update introduced a second regression. On certain\nsystems, PS/2 keyboards failed to work. (BZ#537344)\n\n* a bug in checksum offload calculations could have crashed the bnx2x\nfirmware when the iptable_nat module was loaded, causing network traffic\nto stop. (BZ#537013)\n\n* a check has been added to the IPv4 code to make sure that the routing\ntable data structure, rt, is not NULL, to help prevent future bugs in\nfunctions that call ip_append_data() from being exploitable. (BZ#537016)\n\n* possible kernel pointer dereferences on systems with several NFS mounts\n(a mixture of \"-o lock\" and \"-o nolock\"), which in rare cases may have\ncaused a system crash, have been resolved. (BZ#537017)\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2009:1671",
        "url": "https://access.redhat.com/errata/RHSA-2009:1671"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "526788",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=526788"
      },
      {
        "category": "external",
        "summary": "529137",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529137"
      },
      {
        "category": "external",
        "summary": "529306",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529306"
      },
      {
        "category": "external",
        "summary": "529309",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529309"
      },
      {
        "category": "external",
        "summary": "529597",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529597"
      },
      {
        "category": "external",
        "summary": "529626",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529626"
      },
      {
        "category": "external",
        "summary": "532027",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=532027"
      },
      {
        "category": "external",
        "summary": "533798",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533798"
      },
      {
        "category": "external",
        "summary": "534105",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=534105"
      },
      {
        "category": "external",
        "summary": "534112",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=534112"
      },
      {
        "category": "external",
        "summary": "537013",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=537013"
      },
      {
        "category": "external",
        "summary": "537016",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=537016"
      },
      {
        "category": "external",
        "summary": "537017",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=537017"
      },
      {
        "category": "external",
        "summary": "537344",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=537344"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1671.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security and bug fix update",
    "tracking": {
      "current_release_date": "2024-11-22T03:26:47+00:00",
      "generator": {
        "date": "2024-11-22T03:26:47+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2009:1671",
      "initial_release_date": "2009-12-15T17:12:00+00:00",
      "revision_history": [
        {
          "date": "2009-12-15T17:12:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2009-12-15T12:18:22+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-22T03:26:47+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AS version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux AS version 4",
                  "product_id": "4AS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::as"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Desktop version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux Desktop version 4",
                  "product_id": "4Desktop",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux ES version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux ES version 4",
                  "product_id": "4ES",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::es"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux WS version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux WS version 4",
                  "product_id": "4WS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
                  "product_id": "kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.18.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
                "product": {
                  "name": "kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
                  "product_id": "kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-hugemem@2.6.9-89.0.18.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-89.0.18.EL.i686",
                "product": {
                  "name": "kernel-devel-0:2.6.9-89.0.18.EL.i686",
                  "product_id": "kernel-devel-0:2.6.9-89.0.18.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.18.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
                "product": {
                  "name": "kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
                  "product_id": "kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-89.0.18.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
                "product": {
                  "name": "kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
                  "product_id": "kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-hugemem-devel@2.6.9-89.0.18.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
                "product": {
                  "name": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
                  "product_id": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xenU-devel@2.6.9-89.0.18.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-89.0.18.EL.i686",
                "product": {
                  "name": "kernel-0:2.6.9-89.0.18.EL.i686",
                  "product_id": "kernel-0:2.6.9-89.0.18.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.18.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-smp-0:2.6.9-89.0.18.EL.i686",
                "product": {
                  "name": "kernel-smp-0:2.6.9-89.0.18.EL.i686",
                  "product_id": "kernel-smp-0:2.6.9-89.0.18.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-smp@2.6.9-89.0.18.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xenU-0:2.6.9-89.0.18.EL.i686",
                "product": {
                  "name": "kernel-xenU-0:2.6.9-89.0.18.EL.i686",
                  "product_id": "kernel-xenU-0:2.6.9-89.0.18.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xenU@2.6.9-89.0.18.EL?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
                  "product_id": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.18.EL?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
                "product": {
                  "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
                  "product_id": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-89.0.18.EL?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-89.0.18.EL.ia64",
                "product": {
                  "name": "kernel-devel-0:2.6.9-89.0.18.EL.ia64",
                  "product_id": "kernel-devel-0:2.6.9-89.0.18.EL.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.18.EL?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-89.0.18.EL.ia64",
                "product": {
                  "name": "kernel-0:2.6.9-89.0.18.EL.ia64",
                  "product_id": "kernel-0:2.6.9-89.0.18.EL.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.18.EL?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
                "product": {
                  "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
                  "product_id": "kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-89.0.18.EL?arch=ia64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ia64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
                  "product_id": "kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.18.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
                "product": {
                  "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
                  "product_id": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-89.0.18.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
                "product": {
                  "name": "kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
                  "product_id": "kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.18.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
                "product": {
                  "name": "kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
                  "product_id": "kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-89.0.18.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
                "product": {
                  "name": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
                  "product_id": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xenU-devel@2.6.9-89.0.18.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-89.0.18.EL.x86_64",
                "product": {
                  "name": "kernel-0:2.6.9-89.0.18.EL.x86_64",
                  "product_id": "kernel-0:2.6.9-89.0.18.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.18.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
                "product": {
                  "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
                  "product_id": "kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-89.0.18.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
                "product": {
                  "name": "kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
                  "product_id": "kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-smp@2.6.9-89.0.18.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
                "product": {
                  "name": "kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
                  "product_id": "kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xenU@2.6.9-89.0.18.EL?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-89.0.18.EL.src",
                "product": {
                  "name": "kernel-0:2.6.9-89.0.18.EL.src",
                  "product_id": "kernel-0:2.6.9-89.0.18.EL.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.18.EL?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-doc-0:2.6.9-89.0.18.EL.noarch",
                "product": {
                  "name": "kernel-doc-0:2.6.9-89.0.18.EL.noarch",
                  "product_id": "kernel-doc-0:2.6.9-89.0.18.EL.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@2.6.9-89.0.18.EL?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
                  "product_id": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.18.EL?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
                "product": {
                  "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
                  "product_id": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-89.0.18.EL?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
                "product": {
                  "name": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
                  "product_id": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.18.EL?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-89.0.18.EL.ppc64",
                "product": {
                  "name": "kernel-0:2.6.9-89.0.18.EL.ppc64",
                  "product_id": "kernel-0:2.6.9-89.0.18.EL.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.18.EL?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
                "product": {
                  "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
                  "product_id": "kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-89.0.18.EL?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
                  "product_id": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.18.EL?arch=ppc64iseries"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
                "product": {
                  "name": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
                  "product_id": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.18.EL?arch=ppc64iseries"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
                "product": {
                  "name": "kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
                  "product_id": "kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.18.EL?arch=ppc64iseries"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64iseries"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
                  "product_id": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.18.EL?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-89.0.18.EL.s390x",
                "product": {
                  "name": "kernel-devel-0:2.6.9-89.0.18.EL.s390x",
                  "product_id": "kernel-devel-0:2.6.9-89.0.18.EL.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.18.EL?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-89.0.18.EL.s390x",
                "product": {
                  "name": "kernel-0:2.6.9-89.0.18.EL.s390x",
                  "product_id": "kernel-0:2.6.9-89.0.18.EL.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.18.EL?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
                  "product_id": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.18.EL?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-89.0.18.EL.s390",
                "product": {
                  "name": "kernel-devel-0:2.6.9-89.0.18.EL.s390",
                  "product_id": "kernel-devel-0:2.6.9-89.0.18.EL.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.18.EL?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-89.0.18.EL.s390",
                "product": {
                  "name": "kernel-0:2.6.9-89.0.18.EL.s390",
                  "product_id": "kernel-0:2.6.9-89.0.18.EL.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.18.EL?arch=s390"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.s390 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-89.0.18.EL.s390"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.s390",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.s390x as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-89.0.18.EL.s390x"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.s390x",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.src as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-89.0.18.EL.src"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.src",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.s390 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.s390",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.s390x as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.s390x",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.9-89.0.18.EL.noarch as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-doc-0:2.6.9-89.0.18.EL.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.9-89.0.18.EL.noarch",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-smp-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-smp-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-xenU-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64iseries"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.s390",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390x"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.s390x",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.src as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-89.0.18.EL.src"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.src",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.s390",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.s390x",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.9-89.0.18.EL.noarch as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-doc-0:2.6.9-89.0.18.EL.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.9-89.0.18.EL.noarch",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-hugemem-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-smp-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-xenU-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64iseries"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.s390 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-89.0.18.EL.s390"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.s390",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.s390x as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-89.0.18.EL.s390x"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.s390x",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.src as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-89.0.18.EL.src"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.src",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.s390 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.s390",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.s390x as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.s390x",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.9-89.0.18.EL.noarch as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-doc-0:2.6.9-89.0.18.EL.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.9-89.0.18.EL.noarch",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-hugemem-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-smp-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-smp-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-smp-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-xenU-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.s390 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-89.0.18.EL.s390"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.s390",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.s390x as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-89.0.18.EL.s390x"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.s390x",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.src as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-89.0.18.EL.src"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.src",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.s390 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.s390",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.s390x as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.s390x",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.9-89.0.18.EL.noarch as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-doc-0:2.6.9-89.0.18.EL.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.9-89.0.18.EL.noarch",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-smp-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-smp-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-xenU-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4WS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2009-2910",
      "discovery_date": "2009-10-01T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "526788"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "arch/x86/ia32/ia32entry.S in the Linux kernel before 2.6.31.4 on the x86_64 platform does not clear certain kernel registers before a return to user mode, which allows local users to read register values from an earlier process by switching an ia32 process to 64-bit mode.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: x86_64 32 bit process register leak",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is not planned to be fixed in Red Hat Enterprise Linux 3, due to this product being in Production 3 of its maintenance life-cycle, where only qualified security errata of important and critical impact are addressed.\n\nFor further information about Errata Support Policy, visit: https://access.redhat.com/support/policy/updates/errata/",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:kernel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4AS:kernel-0:2.6.9-89.0.18.EL.s390",
          "4AS:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4AS:kernel-0:2.6.9-89.0.18.EL.src",
          "4AS:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4AS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.src",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4Desktop:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4ES:kernel-0:2.6.9-89.0.18.EL.s390",
          "4ES:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4ES:kernel-0:2.6.9-89.0.18.EL.src",
          "4ES:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4ES:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4WS:kernel-0:2.6.9-89.0.18.EL.s390",
          "4WS:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4WS:kernel-0:2.6.9-89.0.18.EL.src",
          "4WS:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4WS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-2910"
        },
        {
          "category": "external",
          "summary": "RHBZ#526788",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=526788"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2910",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-2910"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2910",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2910"
        }
      ],
      "release_date": "2009-10-01T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-12-15T17:12:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-0:2.6.9-89.0.18.EL.src",
            "4AS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.src",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-0:2.6.9-89.0.18.EL.src",
            "4ES:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-0:2.6.9-89.0.18.EL.src",
            "4WS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1671"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "products": [
            "4AS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-0:2.6.9-89.0.18.EL.src",
            "4AS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.src",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-0:2.6.9-89.0.18.EL.src",
            "4ES:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-0:2.6.9-89.0.18.EL.src",
            "4WS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: x86_64 32 bit process register leak"
    },
    {
      "cve": "CVE-2009-3613",
      "discovery_date": "2009-10-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "529137"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The swiotlb functionality in the r8169 driver in drivers/net/r8169.c in the Linux kernel before 2.6.27.22 allows remote attackers to cause a denial of service (IOMMU space exhaustion and system crash) by using jumbo frames for a large amount of network traffic, as demonstrated by a flood ping.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: flood ping cause out-of-iommu error and panic when mtu larger than 1500",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:kernel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4AS:kernel-0:2.6.9-89.0.18.EL.s390",
          "4AS:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4AS:kernel-0:2.6.9-89.0.18.EL.src",
          "4AS:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4AS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.src",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4Desktop:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4ES:kernel-0:2.6.9-89.0.18.EL.s390",
          "4ES:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4ES:kernel-0:2.6.9-89.0.18.EL.src",
          "4ES:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4ES:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4WS:kernel-0:2.6.9-89.0.18.EL.s390",
          "4WS:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4WS:kernel-0:2.6.9-89.0.18.EL.src",
          "4WS:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4WS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3613"
        },
        {
          "category": "external",
          "summary": "RHBZ#529137",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529137"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3613",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3613"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3613",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3613"
        }
      ],
      "release_date": "2007-11-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-12-15T17:12:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-0:2.6.9-89.0.18.EL.src",
            "4AS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.src",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-0:2.6.9-89.0.18.EL.src",
            "4ES:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-0:2.6.9-89.0.18.EL.src",
            "4WS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1671"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "4AS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-0:2.6.9-89.0.18.EL.src",
            "4AS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.src",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-0:2.6.9-89.0.18.EL.src",
            "4ES:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-0:2.6.9-89.0.18.EL.src",
            "4WS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: flood ping cause out-of-iommu error and panic when mtu larger than 1500"
    },
    {
      "cve": "CVE-2009-3620",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2009-10-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "529597"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The ATI Rage 128 (aka r128) driver in the Linux kernel before 2.6.31-git11 does not properly verify Concurrent Command Engine (CCE) state initialization, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly gain privileges via unspecified ioctl calls.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: r128 IOCTL NULL pointer dereferences when CCE state is uninitialised",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:kernel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4AS:kernel-0:2.6.9-89.0.18.EL.s390",
          "4AS:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4AS:kernel-0:2.6.9-89.0.18.EL.src",
          "4AS:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4AS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.src",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4Desktop:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4ES:kernel-0:2.6.9-89.0.18.EL.s390",
          "4ES:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4ES:kernel-0:2.6.9-89.0.18.EL.src",
          "4ES:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4ES:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4WS:kernel-0:2.6.9-89.0.18.EL.s390",
          "4WS:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4WS:kernel-0:2.6.9-89.0.18.EL.src",
          "4WS:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4WS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3620"
        },
        {
          "category": "external",
          "summary": "RHBZ#529597",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529597"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3620",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3620"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3620",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3620"
        }
      ],
      "release_date": "2009-08-30T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-12-15T17:12:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-0:2.6.9-89.0.18.EL.src",
            "4AS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.src",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-0:2.6.9-89.0.18.EL.src",
            "4ES:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-0:2.6.9-89.0.18.EL.src",
            "4WS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1671"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.9,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "4AS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-0:2.6.9-89.0.18.EL.src",
            "4AS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.src",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-0:2.6.9-89.0.18.EL.src",
            "4ES:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-0:2.6.9-89.0.18.EL.src",
            "4WS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: r128 IOCTL NULL pointer dereferences when CCE state is uninitialised"
    },
    {
      "cve": "CVE-2009-3621",
      "discovery_date": "2009-10-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "529626"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "net/unix/af_unix.c in the Linux kernel 2.6.31.4 and earlier allows local users to cause a denial of service (system hang) by creating an abstract-namespace AF_UNIX listening socket, performing a shutdown operation on this socket, and then performing a series of connect operations to this socket.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: AF_UNIX: Fix deadlock on connecting to shutdown socket",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is not planned to be fixed in Red Hat Enterprise Linux 3, due to this product being in Production 3 of its maintenance life-cycle, where only qualified security errata of important or critical impact are addressed.\n\nFor further information about Errata Support Policy, visit: https://access.redhat.com/support/policy/updates/errata/",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:kernel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4AS:kernel-0:2.6.9-89.0.18.EL.s390",
          "4AS:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4AS:kernel-0:2.6.9-89.0.18.EL.src",
          "4AS:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4AS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.src",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4Desktop:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4ES:kernel-0:2.6.9-89.0.18.EL.s390",
          "4ES:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4ES:kernel-0:2.6.9-89.0.18.EL.src",
          "4ES:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4ES:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4WS:kernel-0:2.6.9-89.0.18.EL.s390",
          "4WS:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4WS:kernel-0:2.6.9-89.0.18.EL.src",
          "4WS:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4WS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3621"
        },
        {
          "category": "external",
          "summary": "RHBZ#529626",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529626"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3621",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3621"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3621",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3621"
        }
      ],
      "release_date": "2009-10-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-12-15T17:12:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-0:2.6.9-89.0.18.EL.src",
            "4AS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.src",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-0:2.6.9-89.0.18.EL.src",
            "4ES:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-0:2.6.9-89.0.18.EL.src",
            "4WS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1671"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.9,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "4AS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-0:2.6.9-89.0.18.EL.src",
            "4AS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.src",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-0:2.6.9-89.0.18.EL.src",
            "4ES:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-0:2.6.9-89.0.18.EL.src",
            "4WS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: AF_UNIX: Fix deadlock on connecting to shutdown socket"
    }
  ]
}
  rhsa-2009:1540
Vulnerability from csaf_redhat
Published
2009-11-03 18:21
    Modified
2025-10-09 13:22
    Summary
Red Hat Security Advisory: kernel-rt security, bug fix, and enhancement update
    Notes
Topic
Updated kernel-rt packages that fix several security issues, multiple bugs,
and add enhancements are now available for Red Hat Enterprise MRG 1.1.
This update has been rated as having important security impact by the Red
Hat Security Response Team.
    Details
The kernel-rt packages contain the Linux kernel, the core of any Linux
operating system.
Security fixes:
* the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags were not cleared when a
setuid or setgid program was executed. A local, unprivileged user could use
this flaw to bypass the mmap_min_addr protection mechanism and perform a
NULL pointer dereference attack, or bypass the Address Space Layout
Randomization (ASLR) security feature. (CVE-2009-1895, Important)
* a system with SELinux enforced was more permissive in allowing local
users in the unconfined_t domain to map low memory areas even if the
mmap_min_addr restriction was enabled. This could aid in the local
exploitation of NULL pointer dereference bugs. (CVE-2009-2695, Important)
* missing initialization flaws were found in getname() implementations in
numerous network protocol implementations in the Linux kernel. Certain
data structures in these getname() implementations were not initialized
properly before being copied to user-space. These flaws could lead to an
information leak. (CVE-2009-3002, Important)
* a NULL pointer dereference flaw was found in each of the following
functions in the Linux kernel: pipe_read_open(), pipe_write_open(), and
pipe_rdwr_open(). When the mutex lock is not held, the i_pipe pointer could
be released by other processes before it is used to update the pipe's
reader and writer counters. This could lead to a local denial of service or
privilege escalation. (CVE-2009-3547, Important)
* a flaw was found in the Realtek r8169 Ethernet driver in the Linux
kernel. pci_unmap_single() presented a memory leak that could lead to IOMMU
space exhaustion and a system crash. An attacker on the local network could
abuse this flaw by using jumbo frames for large amounts of network traffic.
(CVE-2009-3613, Important)
* NULL pointer dereference flaws were found in the r128 driver in the
Linux kernel. Checks to test if the Concurrent Command Engine state was
initialized were missing in private IOCTL functions. An attacker could use
these flaws to cause a local denial of service or escalate their
privileges. (CVE-2009-3620, Important)
* Kees Cook and Steve Beattie discovered a race condition in the /proc
code in the Linux kernel. This could lead to information in the
"/proc/[pid]/maps" and "/proc/[pid]/smaps" files being leaked to users (who
would otherwise not have access to this information) during ELF loading.
This could help a local attacker bypass the ASLR security feature.
(CVE-2009-2691, Moderate)
* a NULL pointer dereference flaw was found in the md driver in the Linux
kernel. If the suspend_lo or suspend_hi file in "/sys/" is modified when
the disk array is inactive, it could lead to a local denial of service or
privilege escalation. By default, only root can write to these two files.
(CVE-2009-2849, Moderate)
* an information leak was found in the Linux kernel. On AMD64 systems,
32-bit processes could access and read certain 64-bit registers by
temporarily switching themselves to 64-bit mode. (CVE-2009-2910, Moderate)
* padding data in several core network structures was not initialized
properly before being sent to user-space, possibly leading to information
leaks. (CVE-2009-3228, CVE-2009-3612, Moderate)
* the unix_stream_connect() function in the Linux kernel did not check if a
UNIX domain socket was in the shutdown state. This could lead to a
deadlock. A local, unprivileged user could use this flaw to cause a denial
of service. (CVE-2009-3621, Moderate)
These updated packages also include bug fixes and enhancements. Users are
directed to the Realtime Security Update Release Notes for version 1.1 for
information on these changes, which will be available shortly from: 
http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_MRG/
Users should upgrade to these updated packages, which contain backported
patches to correct these issues and add enhancements. The system must be
rebooted for this update to take effect.
    Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
    {
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated kernel-rt packages that fix several security issues, multiple bugs,\nand add enhancements are now available for Red Hat Enterprise MRG 1.1.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel-rt packages contain the Linux kernel, the core of any Linux\noperating system.\n\nSecurity fixes:\n\n* the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags were not cleared when a\nsetuid or setgid program was executed. A local, unprivileged user could use\nthis flaw to bypass the mmap_min_addr protection mechanism and perform a\nNULL pointer dereference attack, or bypass the Address Space Layout\nRandomization (ASLR) security feature. (CVE-2009-1895, Important)\n\n* a system with SELinux enforced was more permissive in allowing local\nusers in the unconfined_t domain to map low memory areas even if the\nmmap_min_addr restriction was enabled. This could aid in the local\nexploitation of NULL pointer dereference bugs. (CVE-2009-2695, Important)\n\n* missing initialization flaws were found in getname() implementations in\nnumerous network protocol implementations in the Linux kernel. Certain\ndata structures in these getname() implementations were not initialized\nproperly before being copied to user-space. These flaws could lead to an\ninformation leak. (CVE-2009-3002, Important)\n\n* a NULL pointer dereference flaw was found in each of the following\nfunctions in the Linux kernel: pipe_read_open(), pipe_write_open(), and\npipe_rdwr_open(). When the mutex lock is not held, the i_pipe pointer could\nbe released by other processes before it is used to update the pipe\u0027s\nreader and writer counters. This could lead to a local denial of service or\nprivilege escalation. (CVE-2009-3547, Important)\n\n* a flaw was found in the Realtek r8169 Ethernet driver in the Linux\nkernel. pci_unmap_single() presented a memory leak that could lead to IOMMU\nspace exhaustion and a system crash. An attacker on the local network could\nabuse this flaw by using jumbo frames for large amounts of network traffic.\n(CVE-2009-3613, Important)\n\n* NULL pointer dereference flaws were found in the r128 driver in the\nLinux kernel. Checks to test if the Concurrent Command Engine state was\ninitialized were missing in private IOCTL functions. An attacker could use\nthese flaws to cause a local denial of service or escalate their\nprivileges. (CVE-2009-3620, Important)\n\n* Kees Cook and Steve Beattie discovered a race condition in the /proc\ncode in the Linux kernel. This could lead to information in the\n\"/proc/[pid]/maps\" and \"/proc/[pid]/smaps\" files being leaked to users (who\nwould otherwise not have access to this information) during ELF loading.\nThis could help a local attacker bypass the ASLR security feature.\n(CVE-2009-2691, Moderate)\n\n* a NULL pointer dereference flaw was found in the md driver in the Linux\nkernel. If the suspend_lo or suspend_hi file in \"/sys/\" is modified when\nthe disk array is inactive, it could lead to a local denial of service or\nprivilege escalation. By default, only root can write to these two files.\n(CVE-2009-2849, Moderate)\n\n* an information leak was found in the Linux kernel. On AMD64 systems,\n32-bit processes could access and read certain 64-bit registers by\ntemporarily switching themselves to 64-bit mode. (CVE-2009-2910, Moderate)\n\n* padding data in several core network structures was not initialized\nproperly before being sent to user-space, possibly leading to information\nleaks. (CVE-2009-3228, CVE-2009-3612, Moderate)\n\n* the unix_stream_connect() function in the Linux kernel did not check if a\nUNIX domain socket was in the shutdown state. This could lead to a\ndeadlock. A local, unprivileged user could use this flaw to cause a denial\nof service. (CVE-2009-3621, Moderate)\n\nThese updated packages also include bug fixes and enhancements. Users are\ndirected to the Realtime Security Update Release Notes for version 1.1 for\ninformation on these changes, which will be available shortly from: \n\nhttp://www.redhat.com/docs/en-US/Red_Hat_Enterprise_MRG/\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues and add enhancements. The system must be\nrebooted for this update to take effect.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2009:1540",
        "url": "https://access.redhat.com/errata/RHSA-2009:1540"
      },
      {
        "category": "external",
        "summary": "http://www.redhat.com/security/updates/classification/#important",
        "url": "http://www.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "http://kbase.redhat.com/faq/docs/DOC-18042",
        "url": "http://kbase.redhat.com/faq/docs/DOC-18042"
      },
      {
        "category": "external",
        "summary": "http://kbase.redhat.com/faq/docs/DOC-17866",
        "url": "http://kbase.redhat.com/faq/docs/DOC-17866"
      },
      {
        "category": "external",
        "summary": "529597",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529597"
      },
      {
        "category": "external",
        "summary": "529626",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529626"
      },
      {
        "category": "external",
        "summary": "530490",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=530490"
      },
      {
        "category": "external",
        "summary": "http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_MRG/",
        "url": "http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_MRG/"
      },
      {
        "category": "external",
        "summary": "511171",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=511171"
      },
      {
        "category": "external",
        "summary": "516171",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=516171"
      },
      {
        "category": "external",
        "summary": "517830",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=517830"
      },
      {
        "category": "external",
        "summary": "518132",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=518132"
      },
      {
        "category": "external",
        "summary": "518160",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=518160"
      },
      {
        "category": "external",
        "summary": "519305",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=519305"
      },
      {
        "category": "external",
        "summary": "520990",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=520990"
      },
      {
        "category": "external",
        "summary": "521999",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=521999"
      },
      {
        "category": "external",
        "summary": "522359",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=522359"
      },
      {
        "category": "external",
        "summary": "522501",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=522501"
      },
      {
        "category": "external",
        "summary": "522503",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=522503"
      },
      {
        "category": "external",
        "summary": "523986",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=523986"
      },
      {
        "category": "external",
        "summary": "526788",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=526788"
      },
      {
        "category": "external",
        "summary": "528139",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=528139"
      },
      {
        "category": "external",
        "summary": "528868",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=528868"
      },
      {
        "category": "external",
        "summary": "529137",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529137"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1540.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel-rt security, bug fix, and enhancement update",
    "tracking": {
      "current_release_date": "2025-10-09T13:22:11+00:00",
      "generator": {
        "date": "2025-10-09T13:22:11+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2009:1540",
      "initial_release_date": "2009-11-03T18:21:00+00:00",
      "revision_history": [
        {
          "date": "2009-11-03T18:21:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2009-11-03T13:21:07+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T13:22:11+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "MRG Realtime for RHEL 5 Server",
                "product": {
                  "name": "MRG Realtime for RHEL 5 Server",
                  "product_id": "5Server-MRG-Realtime-1.0",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_mrg:1::el5"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise MRG for RHEL-5"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
                "product": {
                  "name": "kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
                  "product_id": "kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@2.6.24.7-137.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
                "product": {
                  "name": "kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
                  "product_id": "kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@2.6.24.7-137.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
                "product": {
                  "name": "kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
                  "product_id": "kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug@2.6.24.7-137.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
                "product": {
                  "name": "kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
                  "product_id": "kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-devel@2.6.24.7-137.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
                "product": {
                  "name": "kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
                  "product_id": "kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-vanilla@2.6.24.7-137.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
                "product": {
                  "name": "kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
                  "product_id": "kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@2.6.24.7-137.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-0:2.6.24.7-137.el5rt.i686",
                "product": {
                  "name": "kernel-rt-0:2.6.24.7-137.el5rt.i686",
                  "product_id": "kernel-rt-0:2.6.24.7-137.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-137.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
                "product": {
                  "name": "kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
                  "product_id": "kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace@2.6.24.7-137.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
                "product": {
                  "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
                  "product_id": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@2.6.24.7-137.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
                "product": {
                  "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
                  "product_id": "kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@2.6.24.7-137.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
                "product": {
                  "name": "kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
                  "product_id": "kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common@2.6.24.7-137.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
                "product": {
                  "name": "kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
                  "product_id": "kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@2.6.24.7-137.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
                "product": {
                  "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
                  "product_id": "kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@2.6.24.7-137.el5rt?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
                  "product_id": "kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@2.6.24.7-137.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64",
                  "product_id": "kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@2.6.24.7-137.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
                  "product_id": "kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug@2.6.24.7-137.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
                  "product_id": "kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-devel@2.6.24.7-137.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
                  "product_id": "kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-vanilla@2.6.24.7-137.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
                  "product_id": "kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@2.6.24.7-137.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
                  "product_id": "kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-137.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
                  "product_id": "kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace@2.6.24.7-137.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
                  "product_id": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@2.6.24.7-137.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
                  "product_id": "kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@2.6.24.7-137.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
                  "product_id": "kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common@2.6.24.7-137.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
                  "product_id": "kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@2.6.24.7-137.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
                  "product_id": "kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@2.6.24.7-137.el5rt?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
                "product": {
                  "name": "kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
                  "product_id": "kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-doc@2.6.24.7-137.el5rt?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-0:2.6.24.7-137.el5rt.src",
                "product": {
                  "name": "kernel-rt-0:2.6.24.7-137.el5rt.src",
                  "product_id": "kernel-rt-0:2.6.24.7-137.el5rt.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-137.el5rt?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:2.6.24.7-137.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686"
        },
        "product_reference": "kernel-rt-0:2.6.24.7-137.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:2.6.24.7-137.el5rt.src as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src"
        },
        "product_reference": "kernel-rt-0:2.6.24.7-137.el5rt.src",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:2.6.24.7-137.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-0:2.6.24.7-137.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686"
        },
        "product_reference": "kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686"
        },
        "product_reference": "kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686"
        },
        "product_reference": "kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686"
        },
        "product_reference": "kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686"
        },
        "product_reference": "kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-0:2.6.24.7-137.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686"
        },
        "product_reference": "kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch"
        },
        "product_reference": "kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-0:2.6.24.7-137.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686"
        },
        "product_reference": "kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686"
        },
        "product_reference": "kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686"
        },
        "product_reference": "kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686"
        },
        "product_reference": "kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686"
        },
        "product_reference": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686"
        },
        "product_reference": "kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2009-1895",
      "discovery_date": "2009-06-30T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "511171"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The personality subsystem in the Linux kernel before 2.6.31-rc3 has a PER_CLEAR_ON_SETID setting that does not clear the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags when executing a setuid or setgid program, which makes it easier for local users to leverage the details of memory usage to (1) conduct NULL pointer dereference attacks, (2) bypass the mmap_min_addr protection mechanism, or (3) defeat address space layout randomization (ASLR).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: personality: fix PER_CLEAR_ON_SETID",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1895"
        },
        {
          "category": "external",
          "summary": "RHBZ#511171",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=511171"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1895",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1895"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1895",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1895"
        }
      ],
      "release_date": "2009-06-26T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T18:21:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1540"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: personality: fix PER_CLEAR_ON_SETID"
    },
    {
      "cve": "CVE-2009-2691",
      "discovery_date": "2009-08-07T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "516171"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The mm_for_maps function in fs/proc/base.c in the Linux kernel 2.6.30.4 and earlier allows local users to read (1) maps and (2) smaps files under proc/ via vectors related to ELF loading, a setuid process, and a race condition.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: /proc/$pid/maps visible during initial setuid ELF loading",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "We currently have no plans to fix this flaw in Red Hat Enterprise Linux 3, 4, and 5 as it is not possible to trigger the information leak if the suid_dumpable tunable is set to zero (which is the default).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-2691"
        },
        {
          "category": "external",
          "summary": "RHBZ#516171",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=516171"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2691",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-2691"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2691",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2691"
        }
      ],
      "release_date": "2009-07-10T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T18:21:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1540"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: /proc/$pid/maps visible during initial setuid ELF loading"
    },
    {
      "cve": "CVE-2009-2695",
      "discovery_date": "2009-08-17T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "517830"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The Linux kernel before 2.6.31-rc7 does not properly prevent mmap operations that target page zero and other low memory addresses, which allows local users to gain privileges by exploiting NULL pointer dereference vulnerabilities, related to (1) the default configuration of the allow_unconfined_mmap_low boolean in SELinux on Red Hat Enterprise Linux (RHEL) 5, (2) an error that causes allow_unconfined_mmap_low to be ignored in the unconfined_t domain, (3) lack of a requirement for the CAP_SYS_RAWIO capability for these mmap operations, and (4) interaction between the mmap_min_addr protection mechanism and certain application programs.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: SELinux and mmap_min_addr",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-2695"
        },
        {
          "category": "external",
          "summary": "RHBZ#517830",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=517830"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2695",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-2695"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2695",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2695"
        }
      ],
      "release_date": "2009-07-31T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T18:21:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1540"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: SELinux and mmap_min_addr"
    },
    {
      "cve": "CVE-2009-2849",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2009-08-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "518132"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The md driver (drivers/md/md.c) in the Linux kernel before 2.6.30.2 might allow local users to cause a denial of service (NULL pointer dereference) via vectors related to \"suspend_* sysfs attributes\" and the (1) suspend_lo_store or (2) suspend_hi_store functions.  NOTE: this is only a vulnerability when sysfs is writable by an attacker.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: md: NULL pointer deref when accessing suspend_* sysfs attributes",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The flaw was introduced in kernel version 2.6.17-rc1. The Linux kernel as shipped with Red Hat Enterprise Linux 3, and 4 are not affected by this issue.\n\nA future kernel update for Red Hat Enterprise Linux 5 will address this flaw.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-2849"
        },
        {
          "category": "external",
          "summary": "RHBZ#518132",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=518132"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2849",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-2849"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2849",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2849"
        }
      ],
      "release_date": "2009-07-01T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T18:21:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1540"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "HIGH",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.2,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: md: NULL pointer deref when accessing suspend_* sysfs attributes"
    },
    {
      "cve": "CVE-2009-2910",
      "discovery_date": "2009-10-01T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "526788"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "arch/x86/ia32/ia32entry.S in the Linux kernel before 2.6.31.4 on the x86_64 platform does not clear certain kernel registers before a return to user mode, which allows local users to read register values from an earlier process by switching an ia32 process to 64-bit mode.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: x86_64 32 bit process register leak",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is not planned to be fixed in Red Hat Enterprise Linux 3, due to this product being in Production 3 of its maintenance life-cycle, where only qualified security errata of important and critical impact are addressed.\n\nFor further information about Errata Support Policy, visit: https://access.redhat.com/support/policy/updates/errata/",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-2910"
        },
        {
          "category": "external",
          "summary": "RHBZ#526788",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=526788"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2910",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-2910"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2910",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2910"
        }
      ],
      "release_date": "2009-10-01T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T18:21:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1540"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: x86_64 32 bit process register leak"
    },
    {
      "cve": "CVE-2009-3002",
      "discovery_date": "2009-08-26T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "519305"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The Linux kernel before 2.6.31-rc7 does not initialize certain data structures within getname functions, which allows local users to read the contents of some kernel memory locations by calling getsockname on (1) an AF_APPLETALK socket, related to the atalk_getname function in net/appletalk/ddp.c; (2) an AF_IRDA socket, related to the irda_getname function in net/irda/af_irda.c; (3) an AF_ECONET socket, related to the econet_getname function in net/econet/af_econet.c; (4) an AF_NETROM socket, related to the nr_getname function in net/netrom/af_netrom.c; (5) an AF_ROSE socket, related to the rose_getname function in net/rose/af_rose.c; or (6) a raw CAN socket, related to the raw_getname function in net/can/raw.c.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: numerous getname() infoleaks",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "CVE-2009-3002 describes a collection of similar information leaks that affect numerous networking protocols.\n\nThe Linux kernel as shipped with Red Hat Enterprise Linux 4 and 5 did not enable support for the AppleTalk DDP protocol, and therefore were not affected by issue (1).\n\nThe Linux kernel as shipped with Red Hat Enterprise Linux 4, 5 and Red Hat Enterprise MRG did not enable support for IrDA sockets, and therefore were not affected by issue (2).\n\nThe Linux kernel as shipped with Red Hat Enterprise Linux 3, 4, 5, and Red Hat Enterprise MRG did not enable support for the Acorn Econet and AUN protocols, and therefore were not affected by issue (3).\n\nThe Linux kernel as shipped with Red Hat Enterprise Linux 4, 5, and Red Hat Enterprise MRG did not enable support for the NET/ROM and ROSE protocols, and therefore were not affected by issues (4) and (5).\n\nThe raw_getname() leak was introduced in the Linux kernel version 2.6.25-rc1. The Linux kernel as shipped with Red Hat Enterprise Linux 3, 4, 5, and Red Hat Enterprise MRG therefore were not affected by issue (6).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3002"
        },
        {
          "category": "external",
          "summary": "RHBZ#519305",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=519305"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3002",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3002"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3002",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3002"
        }
      ],
      "release_date": "2009-08-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T18:21:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1540"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: numerous getname() infoleaks"
    },
    {
      "cve": "CVE-2009-3228",
      "cwe": {
        "id": "CWE-401",
        "name": "Missing Release of Memory after Effective Lifetime"
      },
      "discovery_date": "2009-09-03T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "520990"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The tc_fill_tclass function in net/sched/sch_api.c in the tc subsystem in the Linux kernel 2.4.x before 2.4.37.6 and 2.6.x before 2.6.31-rc9 does not initialize certain (1) tcm__pad1 and (2) tcm__pad2 structure members, which might allow local users to obtain sensitive information from kernel memory via unspecified vectors.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: tc: uninitialised kernel memory leak",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3228"
        },
        {
          "category": "external",
          "summary": "RHBZ#520990",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=520990"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3228",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3228"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3228",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3228"
        }
      ],
      "release_date": "2009-09-02T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T18:21:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1540"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: tc: uninitialised kernel memory leak"
    },
    {
      "cve": "CVE-2009-3547",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2009-10-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "530490"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Multiple race conditions in fs/pipe.c in the Linux kernel before 2.6.32-rc6 allow local users to cause a denial of service (NULL pointer dereference and system crash) or gain privileges by attempting to open an anonymous pipe via a /proc/*/fd/ pathname.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: fs: pipe.c null pointer dereference",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3547"
        },
        {
          "category": "external",
          "summary": "RHBZ#530490",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=530490"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3547",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3547"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3547",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3547"
        }
      ],
      "release_date": "2009-10-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T18:21:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1540"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: fs: pipe.c null pointer dereference"
    },
    {
      "cve": "CVE-2009-3612",
      "discovery_date": "2009-10-14T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "528868"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The tcf_fill_node function in net/sched/cls_api.c in the netlink subsystem in the Linux kernel 2.6.x before 2.6.32-rc5, and 2.4.37.6 and earlier, does not initialize a certain tcm__pad2 structure member, which might allow local users to obtain sensitive information from kernel memory via unspecified vectors.  NOTE: this issue exists because of an incomplete fix for CVE-2005-4881.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: tcf_fill_node() infoleak due to typo in 9ef1d4c7",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is not planned to be fixed in Red Hat Enterprise Linux 3 due to this product being in Production 3 of its maintenance life-cycle, where only qualified security errata of important or critical impact are addressed.\n\nFor further information about the Errata Support Policy, visit: https://access.redhat.com/support/policy/updates/errata/",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3612"
        },
        {
          "category": "external",
          "summary": "RHBZ#528868",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=528868"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3612",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3612"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3612",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3612"
        }
      ],
      "release_date": "2009-10-08T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T18:21:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1540"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: tcf_fill_node() infoleak due to typo in 9ef1d4c7"
    },
    {
      "cve": "CVE-2009-3613",
      "discovery_date": "2009-10-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "529137"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The swiotlb functionality in the r8169 driver in drivers/net/r8169.c in the Linux kernel before 2.6.27.22 allows remote attackers to cause a denial of service (IOMMU space exhaustion and system crash) by using jumbo frames for a large amount of network traffic, as demonstrated by a flood ping.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: flood ping cause out-of-iommu error and panic when mtu larger than 1500",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3613"
        },
        {
          "category": "external",
          "summary": "RHBZ#529137",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529137"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3613",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3613"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3613",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3613"
        }
      ],
      "release_date": "2007-11-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T18:21:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1540"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: flood ping cause out-of-iommu error and panic when mtu larger than 1500"
    },
    {
      "cve": "CVE-2009-3620",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2009-10-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "529597"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The ATI Rage 128 (aka r128) driver in the Linux kernel before 2.6.31-git11 does not properly verify Concurrent Command Engine (CCE) state initialization, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly gain privileges via unspecified ioctl calls.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: r128 IOCTL NULL pointer dereferences when CCE state is uninitialised",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3620"
        },
        {
          "category": "external",
          "summary": "RHBZ#529597",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529597"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3620",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3620"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3620",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3620"
        }
      ],
      "release_date": "2009-08-30T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T18:21:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1540"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.9,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: r128 IOCTL NULL pointer dereferences when CCE state is uninitialised"
    },
    {
      "cve": "CVE-2009-3621",
      "discovery_date": "2009-10-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "529626"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "net/unix/af_unix.c in the Linux kernel 2.6.31.4 and earlier allows local users to cause a denial of service (system hang) by creating an abstract-namespace AF_UNIX listening socket, performing a shutdown operation on this socket, and then performing a series of connect operations to this socket.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: AF_UNIX: Fix deadlock on connecting to shutdown socket",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is not planned to be fixed in Red Hat Enterprise Linux 3, due to this product being in Production 3 of its maintenance life-cycle, where only qualified security errata of important or critical impact are addressed.\n\nFor further information about Errata Support Policy, visit: https://access.redhat.com/support/policy/updates/errata/",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3621"
        },
        {
          "category": "external",
          "summary": "RHBZ#529626",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529626"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3621",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3621"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3621",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3621"
        }
      ],
      "release_date": "2009-10-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T18:21:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1540"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.9,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: AF_UNIX: Fix deadlock on connecting to shutdown socket"
    }
  ]
}
  rhsa-2010_0046
Vulnerability from csaf_redhat
Published
2010-01-19 23:30
    Modified
2024-11-22 03:30
    Summary
Red Hat Security Advisory: kernel security and bug fix update
    Notes
Topic
Updated kernel packages that fix multiple security issues and several bugs
are now available for Red Hat Enterprise Linux 5.
This update has been rated as having important security impact by the Red
Hat Security Response Team.
    Details
The kernel packages contain the Linux kernel, the core of any Linux
operating system.
Security fixes:
* an array index error was found in the gdth driver. A local user could
send a specially-crafted IOCTL request that would cause a denial of service
or, possibly, privilege escalation. (CVE-2009-3080, Important)
* a flaw was found in the FUSE implementation. When a system is low on
memory, fuse_put_request() could dereference an invalid pointer, possibly
leading to a local denial of service or privilege escalation.
(CVE-2009-4021, Important)
* Tavis Ormandy discovered a deficiency in the fasync_helper()
implementation. This could allow a local, unprivileged user to leverage a
use-after-free of locked, asynchronous file descriptors to cause a denial
of service or privilege escalation. (CVE-2009-4141, Important)
* the Parallels Virtuozzo Containers team reported the RHSA-2009:1243
update introduced two flaws in the routing implementation. If an attacker
was able to cause a large enough number of collisions in the routing hash
table (via specially-crafted packets) for the emergency route flush to
trigger, a deadlock could occur. Secondly, if the kernel routing cache was
disabled, an uninitialized pointer would be left behind after a route
lookup, leading to a kernel panic. (CVE-2009-4272, Important)
* the RHSA-2009:0225 update introduced a rewrite attack flaw in the
do_coredump() function. A local attacker able to guess the file name a
process is going to dump its core to, prior to the process crashing, could
use this flaw to append data to the dumped core file. This issue only
affects systems that have "/proc/sys/fs/suid_dumpable" set to 2 (the
default value is 0). (CVE-2006-6304, Moderate)
The fix for CVE-2006-6304 changes the expected behavior: With suid_dumpable
set to 2, the core file will not be recorded if the file already exists.
For example, core files will not be overwritten on subsequent crashes of
processes whose core files map to the same name.
* an information leak was found in the Linux kernel. On AMD64 systems,
32-bit processes could access and read certain 64-bit registers by
temporarily switching themselves to 64-bit mode. (CVE-2009-2910, Moderate)
* the RHBA-2008:0314 update introduced N_Port ID Virtualization (NPIV)
support in the qla2xxx driver, resulting in two new sysfs pseudo files,
"/sys/class/scsi_host/[a qla2xxx host]/vport_create" and "vport_delete".
These two files were world-writable by default, allowing a local user to
change SCSI host attributes. This flaw only affects systems using the
qla2xxx driver and NPIV capable hardware. (CVE-2009-3556, Moderate)
* permission issues were found in the megaraid_sas driver. The "dbg_lvl"
and "poll_mode_io" files on the sysfs file system ("/sys/") had
world-writable permissions. This could allow local, unprivileged users to
change the behavior of the driver. (CVE-2009-3889, CVE-2009-3939, Moderate)
* a NULL pointer dereference flaw was found in the firewire-ohci driver
used for OHCI compliant IEEE 1394 controllers. A local, unprivileged user
with access to /dev/fw* files could issue certain IOCTL calls, causing a
denial of service or privilege escalation. The FireWire modules are
blacklisted by default, and if enabled, only root has access to the files
noted above by default. (CVE-2009-4138, Moderate)
* a buffer overflow flaw was found in the hfs_bnode_read() function in the
HFS file system implementation. This could lead to a denial of service if a
user browsed a specially-crafted HFS file system, for example, by running
"ls". (CVE-2009-4020, Low)
Bug fix documentation for this update will be available shortly from
www.redhat.com/docs/en-US/errata/RHSA-2010-0046/Kernel_Security_Update/
index.html
Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.
    Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
    {
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated kernel packages that fix multiple security issues and several bugs\nare now available for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nSecurity fixes:\n\n* an array index error was found in the gdth driver. A local user could\nsend a specially-crafted IOCTL request that would cause a denial of service\nor, possibly, privilege escalation. (CVE-2009-3080, Important)\n\n* a flaw was found in the FUSE implementation. When a system is low on\nmemory, fuse_put_request() could dereference an invalid pointer, possibly\nleading to a local denial of service or privilege escalation.\n(CVE-2009-4021, Important)\n\n* Tavis Ormandy discovered a deficiency in the fasync_helper()\nimplementation. This could allow a local, unprivileged user to leverage a\nuse-after-free of locked, asynchronous file descriptors to cause a denial\nof service or privilege escalation. (CVE-2009-4141, Important)\n\n* the Parallels Virtuozzo Containers team reported the RHSA-2009:1243\nupdate introduced two flaws in the routing implementation. If an attacker\nwas able to cause a large enough number of collisions in the routing hash\ntable (via specially-crafted packets) for the emergency route flush to\ntrigger, a deadlock could occur. Secondly, if the kernel routing cache was\ndisabled, an uninitialized pointer would be left behind after a route\nlookup, leading to a kernel panic. (CVE-2009-4272, Important)\n\n* the RHSA-2009:0225 update introduced a rewrite attack flaw in the\ndo_coredump() function. A local attacker able to guess the file name a\nprocess is going to dump its core to, prior to the process crashing, could\nuse this flaw to append data to the dumped core file. This issue only\naffects systems that have \"/proc/sys/fs/suid_dumpable\" set to 2 (the\ndefault value is 0). (CVE-2006-6304, Moderate)\n\nThe fix for CVE-2006-6304 changes the expected behavior: With suid_dumpable\nset to 2, the core file will not be recorded if the file already exists.\nFor example, core files will not be overwritten on subsequent crashes of\nprocesses whose core files map to the same name.\n\n* an information leak was found in the Linux kernel. On AMD64 systems,\n32-bit processes could access and read certain 64-bit registers by\ntemporarily switching themselves to 64-bit mode. (CVE-2009-2910, Moderate)\n\n* the RHBA-2008:0314 update introduced N_Port ID Virtualization (NPIV)\nsupport in the qla2xxx driver, resulting in two new sysfs pseudo files,\n\"/sys/class/scsi_host/[a qla2xxx host]/vport_create\" and \"vport_delete\".\nThese two files were world-writable by default, allowing a local user to\nchange SCSI host attributes. This flaw only affects systems using the\nqla2xxx driver and NPIV capable hardware. (CVE-2009-3556, Moderate)\n\n* permission issues were found in the megaraid_sas driver. The \"dbg_lvl\"\nand \"poll_mode_io\" files on the sysfs file system (\"/sys/\") had\nworld-writable permissions. This could allow local, unprivileged users to\nchange the behavior of the driver. (CVE-2009-3889, CVE-2009-3939, Moderate)\n\n* a NULL pointer dereference flaw was found in the firewire-ohci driver\nused for OHCI compliant IEEE 1394 controllers. A local, unprivileged user\nwith access to /dev/fw* files could issue certain IOCTL calls, causing a\ndenial of service or privilege escalation. The FireWire modules are\nblacklisted by default, and if enabled, only root has access to the files\nnoted above by default. (CVE-2009-4138, Moderate)\n\n* a buffer overflow flaw was found in the hfs_bnode_read() function in the\nHFS file system implementation. This could lead to a denial of service if a\nuser browsed a specially-crafted HFS file system, for example, by running\n\"ls\". (CVE-2009-4020, Low)\n\nBug fix documentation for this update will be available shortly from\nwww.redhat.com/docs/en-US/errata/RHSA-2010-0046/Kernel_Security_Update/\nindex.html\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2010:0046",
        "url": "https://access.redhat.com/errata/RHSA-2010:0046"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "http://kbase.redhat.com/faq/docs/DOC-20536",
        "url": "http://kbase.redhat.com/faq/docs/DOC-20536"
      },
      {
        "category": "external",
        "summary": "526068",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=526068"
      },
      {
        "category": "external",
        "summary": "526788",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=526788"
      },
      {
        "category": "external",
        "summary": "537027",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=537027"
      },
      {
        "category": "external",
        "summary": "537177",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=537177"
      },
      {
        "category": "external",
        "summary": "537273",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=537273"
      },
      {
        "category": "external",
        "summary": "538734",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=538734"
      },
      {
        "category": "external",
        "summary": "539414",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539414"
      },
      {
        "category": "external",
        "summary": "539686",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539686"
      },
      {
        "category": "external",
        "summary": "540736",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=540736"
      },
      {
        "category": "external",
        "summary": "540896",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=540896"
      },
      {
        "category": "external",
        "summary": "542582",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=542582"
      },
      {
        "category": "external",
        "summary": "543448",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=543448"
      },
      {
        "category": "external",
        "summary": "544978",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=544978"
      },
      {
        "category": "external",
        "summary": "545411",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=545411"
      },
      {
        "category": "external",
        "summary": "547236",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=547236"
      },
      {
        "category": "external",
        "summary": "547521",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=547521"
      },
      {
        "category": "external",
        "summary": "547530",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=547530"
      },
      {
        "category": "external",
        "summary": "547906",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=547906"
      },
      {
        "category": "external",
        "summary": "548370",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=548370"
      },
      {
        "category": "external",
        "summary": "549905",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=549905"
      },
      {
        "category": "external",
        "summary": "549906",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=549906"
      },
      {
        "category": "external",
        "summary": "549907",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=549907"
      },
      {
        "category": "external",
        "summary": "549908",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=549908"
      },
      {
        "category": "external",
        "summary": "550968",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=550968"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0046.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security and bug fix update",
    "tracking": {
      "current_release_date": "2024-11-22T03:30:31+00:00",
      "generator": {
        "date": "2024-11-22T03:30:31+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2010:0046",
      "initial_release_date": "2010-01-19T23:30:00+00:00",
      "revision_history": [
        {
          "date": "2010-01-19T23:30:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2010-01-19T18:36:43+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-22T03:30:31+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
                "product": {
                  "name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
                  "product_id": "5Client",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:5::client"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux (v. 5 server)",
                "product": {
                  "name": "Red Hat Enterprise Linux (v. 5 server)",
                  "product_id": "5Server",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:5::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-PAE-0:2.6.18-164.11.1.el5.i686",
                "product": {
                  "name": "kernel-PAE-0:2.6.18-164.11.1.el5.i686",
                  "product_id": "kernel-PAE-0:2.6.18-164.11.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-164.11.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-164.11.1.el5.i686",
                "product": {
                  "name": "kernel-devel-0:2.6.18-164.11.1.el5.i686",
                  "product_id": "kernel-devel-0:2.6.18-164.11.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-164.11.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
                "product": {
                  "name": "kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
                  "product_id": "kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-164.11.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-0:2.6.18-164.11.1.el5.i686",
                "product": {
                  "name": "kernel-xen-0:2.6.18-164.11.1.el5.i686",
                  "product_id": "kernel-xen-0:2.6.18-164.11.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-164.11.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
                  "product_id": "kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-164.11.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
                "product": {
                  "name": "kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
                  "product_id": "kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-164.11.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-164.11.1.el5.i686",
                "product": {
                  "name": "kernel-0:2.6.18-164.11.1.el5.i686",
                  "product_id": "kernel-0:2.6.18-164.11.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-164.11.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
                  "product_id": "kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-164.11.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
                "product": {
                  "name": "kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
                  "product_id": "kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-164.11.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-164.11.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-164.11.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
                "product": {
                  "name": "kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
                  "product_id": "kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-164.11.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-164.11.1.el5.i686",
                "product": {
                  "name": "kernel-debug-0:2.6.18-164.11.1.el5.i686",
                  "product_id": "kernel-debug-0:2.6.18-164.11.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-164.11.1.el5?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-164.11.1.el5.i386",
                "product": {
                  "name": "kernel-headers-0:2.6.18-164.11.1.el5.i386",
                  "product_id": "kernel-headers-0:2.6.18-164.11.1.el5.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-164.11.1.el5?arch=i386"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i386"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
                "product": {
                  "name": "kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
                  "product_id": "kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-164.11.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
                "product": {
                  "name": "kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
                  "product_id": "kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-164.11.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
                "product": {
                  "name": "kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
                  "product_id": "kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-164.11.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
                  "product_id": "kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-164.11.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-164.11.1.el5.x86_64",
                "product": {
                  "name": "kernel-0:2.6.18-164.11.1.el5.x86_64",
                  "product_id": "kernel-0:2.6.18-164.11.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-164.11.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
                  "product_id": "kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-164.11.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
                "product": {
                  "name": "kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
                  "product_id": "kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-164.11.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-164.11.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
                "product": {
                  "name": "kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
                  "product_id": "kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-164.11.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-164.11.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
                "product": {
                  "name": "kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
                  "product_id": "kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-164.11.1.el5?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-doc-0:2.6.18-164.11.1.el5.noarch",
                "product": {
                  "name": "kernel-doc-0:2.6.18-164.11.1.el5.noarch",
                  "product_id": "kernel-doc-0:2.6.18-164.11.1.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@2.6.18-164.11.1.el5?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-164.11.1.el5.src",
                "product": {
                  "name": "kernel-0:2.6.18-164.11.1.el5.src",
                  "product_id": "kernel-0:2.6.18-164.11.1.el5.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-164.11.1.el5?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-164.11.1.el5.ia64",
                "product": {
                  "name": "kernel-devel-0:2.6.18-164.11.1.el5.ia64",
                  "product_id": "kernel-devel-0:2.6.18-164.11.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-164.11.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
                "product": {
                  "name": "kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
                  "product_id": "kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-164.11.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-0:2.6.18-164.11.1.el5.ia64",
                "product": {
                  "name": "kernel-xen-0:2.6.18-164.11.1.el5.ia64",
                  "product_id": "kernel-xen-0:2.6.18-164.11.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-164.11.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
                  "product_id": "kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-164.11.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-164.11.1.el5.ia64",
                "product": {
                  "name": "kernel-0:2.6.18-164.11.1.el5.ia64",
                  "product_id": "kernel-0:2.6.18-164.11.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-164.11.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
                  "product_id": "kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-164.11.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
                "product": {
                  "name": "kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
                  "product_id": "kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-164.11.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-164.11.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-164.11.1.el5.ia64",
                "product": {
                  "name": "kernel-headers-0:2.6.18-164.11.1.el5.ia64",
                  "product_id": "kernel-headers-0:2.6.18-164.11.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-164.11.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-164.11.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-164.11.1.el5.ia64",
                "product": {
                  "name": "kernel-debug-0:2.6.18-164.11.1.el5.ia64",
                  "product_id": "kernel-debug-0:2.6.18-164.11.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-164.11.1.el5?arch=ia64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ia64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
                "product": {
                  "name": "kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
                  "product_id": "kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-164.11.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
                "product": {
                  "name": "kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
                  "product_id": "kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-164.11.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
                  "product_id": "kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-164.11.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-164.11.1.el5.ppc64",
                "product": {
                  "name": "kernel-0:2.6.18-164.11.1.el5.ppc64",
                  "product_id": "kernel-0:2.6.18-164.11.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-164.11.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
                "product": {
                  "name": "kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
                  "product_id": "kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-164.11.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
                  "product_id": "kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-164.11.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-164.11.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
                "product": {
                  "name": "kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
                  "product_id": "kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-164.11.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-164.11.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
                "product": {
                  "name": "kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
                  "product_id": "kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-164.11.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
                "product": {
                  "name": "kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
                  "product_id": "kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-164.11.1.el5?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-164.11.1.el5.ppc",
                "product": {
                  "name": "kernel-headers-0:2.6.18-164.11.1.el5.ppc",
                  "product_id": "kernel-headers-0:2.6.18-164.11.1.el5.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-164.11.1.el5?arch=ppc"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-164.11.1.el5.s390x",
                "product": {
                  "name": "kernel-devel-0:2.6.18-164.11.1.el5.s390x",
                  "product_id": "kernel-devel-0:2.6.18-164.11.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-164.11.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
                "product": {
                  "name": "kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
                  "product_id": "kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-164.11.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
                  "product_id": "kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-164.11.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-164.11.1.el5.s390x",
                "product": {
                  "name": "kernel-0:2.6.18-164.11.1.el5.s390x",
                  "product_id": "kernel-0:2.6.18-164.11.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-164.11.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
                "product": {
                  "name": "kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
                  "product_id": "kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-164.11.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
                  "product_id": "kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-164.11.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-164.11.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-164.11.1.el5.s390x",
                "product": {
                  "name": "kernel-headers-0:2.6.18-164.11.1.el5.s390x",
                  "product_id": "kernel-headers-0:2.6.18-164.11.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-164.11.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-164.11.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
                "product": {
                  "name": "kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
                  "product_id": "kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-164.11.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-164.11.1.el5.s390x",
                "product": {
                  "name": "kernel-debug-0:2.6.18-164.11.1.el5.s390x",
                  "product_id": "kernel-debug-0:2.6.18-164.11.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-164.11.1.el5?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-164.11.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-0:2.6.18-164.11.1.el5.i686"
        },
        "product_reference": "kernel-0:2.6.18-164.11.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-164.11.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-0:2.6.18-164.11.1.el5.ia64"
        },
        "product_reference": "kernel-0:2.6.18-164.11.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-164.11.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64"
        },
        "product_reference": "kernel-0:2.6.18-164.11.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-164.11.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-0:2.6.18-164.11.1.el5.s390x"
        },
        "product_reference": "kernel-0:2.6.18-164.11.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-164.11.1.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-0:2.6.18-164.11.1.el5.src"
        },
        "product_reference": "kernel-0:2.6.18-164.11.1.el5.src",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-164.11.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64"
        },
        "product_reference": "kernel-0:2.6.18-164.11.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-0:2.6.18-164.11.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686"
        },
        "product_reference": "kernel-PAE-0:2.6.18-164.11.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686"
        },
        "product_reference": "kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686"
        },
        "product_reference": "kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-164.11.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686"
        },
        "product_reference": "kernel-debug-0:2.6.18-164.11.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-164.11.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64"
        },
        "product_reference": "kernel-debug-0:2.6.18-164.11.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-164.11.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64"
        },
        "product_reference": "kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-164.11.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x"
        },
        "product_reference": "kernel-debug-0:2.6.18-164.11.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-164.11.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64"
        },
        "product_reference": "kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-164.11.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-164.11.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-164.11.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686"
        },
        "product_reference": "kernel-devel-0:2.6.18-164.11.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-164.11.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.18-164.11.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-164.11.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-164.11.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.18-164.11.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-164.11.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.18-164.11.1.el5.noarch as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.18-164.11.1.el5.noarch",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-164.11.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386"
        },
        "product_reference": "kernel-headers-0:2.6.18-164.11.1.el5.i386",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-164.11.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64"
        },
        "product_reference": "kernel-headers-0:2.6.18-164.11.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-164.11.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc"
        },
        "product_reference": "kernel-headers-0:2.6.18-164.11.1.el5.ppc",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-164.11.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64"
        },
        "product_reference": "kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-164.11.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x"
        },
        "product_reference": "kernel-headers-0:2.6.18-164.11.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-164.11.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64"
        },
        "product_reference": "kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:2.6.18-164.11.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64"
        },
        "product_reference": "kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:2.6.18-164.11.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x"
        },
        "product_reference": "kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64"
        },
        "product_reference": "kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64"
        },
        "product_reference": "kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-164.11.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686"
        },
        "product_reference": "kernel-xen-0:2.6.18-164.11.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-164.11.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64"
        },
        "product_reference": "kernel-xen-0:2.6.18-164.11.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-164.11.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64"
        },
        "product_reference": "kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-164.11.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-164.11.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-0:2.6.18-164.11.1.el5.i686"
        },
        "product_reference": "kernel-0:2.6.18-164.11.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-164.11.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-0:2.6.18-164.11.1.el5.ia64"
        },
        "product_reference": "kernel-0:2.6.18-164.11.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-164.11.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64"
        },
        "product_reference": "kernel-0:2.6.18-164.11.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-164.11.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-0:2.6.18-164.11.1.el5.s390x"
        },
        "product_reference": "kernel-0:2.6.18-164.11.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-164.11.1.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-0:2.6.18-164.11.1.el5.src"
        },
        "product_reference": "kernel-0:2.6.18-164.11.1.el5.src",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-164.11.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64"
        },
        "product_reference": "kernel-0:2.6.18-164.11.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-0:2.6.18-164.11.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686"
        },
        "product_reference": "kernel-PAE-0:2.6.18-164.11.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686"
        },
        "product_reference": "kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686"
        },
        "product_reference": "kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-164.11.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686"
        },
        "product_reference": "kernel-debug-0:2.6.18-164.11.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-164.11.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64"
        },
        "product_reference": "kernel-debug-0:2.6.18-164.11.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-164.11.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64"
        },
        "product_reference": "kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-164.11.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x"
        },
        "product_reference": "kernel-debug-0:2.6.18-164.11.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-164.11.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64"
        },
        "product_reference": "kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-164.11.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-164.11.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-164.11.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686"
        },
        "product_reference": "kernel-devel-0:2.6.18-164.11.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-164.11.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.18-164.11.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-164.11.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-164.11.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.18-164.11.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-164.11.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.18-164.11.1.el5.noarch as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.18-164.11.1.el5.noarch",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-164.11.1.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386"
        },
        "product_reference": "kernel-headers-0:2.6.18-164.11.1.el5.i386",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-164.11.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64"
        },
        "product_reference": "kernel-headers-0:2.6.18-164.11.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-164.11.1.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc"
        },
        "product_reference": "kernel-headers-0:2.6.18-164.11.1.el5.ppc",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-164.11.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64"
        },
        "product_reference": "kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-164.11.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x"
        },
        "product_reference": "kernel-headers-0:2.6.18-164.11.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-164.11.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64"
        },
        "product_reference": "kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:2.6.18-164.11.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64"
        },
        "product_reference": "kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:2.6.18-164.11.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x"
        },
        "product_reference": "kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64"
        },
        "product_reference": "kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64"
        },
        "product_reference": "kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-164.11.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686"
        },
        "product_reference": "kernel-xen-0:2.6.18-164.11.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-164.11.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64"
        },
        "product_reference": "kernel-xen-0:2.6.18-164.11.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-164.11.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64"
        },
        "product_reference": "kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-164.11.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2006-6304",
      "discovery_date": "2009-12-04T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "537273"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The do_coredump function in fs/exec.c in the Linux kernel 2.6.19 sets the flag variable to O_EXCL but does not use it, which allows context-dependent attackers to modify arbitrary files via a rewrite attack during a core dump.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use flag in do_coredump()",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 3, 4 and Red Hat Enterprise MRG. Shipped kernels do not include upstream commit d025c9db that introduced the problem.\n\nThis upstream commit was backported in Red Hat Enterprise Linux 5 via RHSA-2009:0225. It was later reported and addressed in Red Hat Enterprise Linux 5 via RHSA-2010:0046.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-0:2.6.18-164.11.1.el5.src",
          "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-0:2.6.18-164.11.1.el5.src",
          "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2006-6304"
        },
        {
          "category": "external",
          "summary": "RHBZ#537273",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=537273"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2006-6304",
          "url": "https://www.cve.org/CVERecord?id=CVE-2006-6304"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-6304",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-6304"
        }
      ],
      "release_date": "2009-11-12T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-01-19T23:30:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.11.1.el5.src",
            "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.11.1.el5.src",
            "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0046"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 1.9,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.11.1.el5.src",
            "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.11.1.el5.src",
            "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use flag in do_coredump()"
    },
    {
      "cve": "CVE-2009-2910",
      "discovery_date": "2009-10-01T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "526788"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "arch/x86/ia32/ia32entry.S in the Linux kernel before 2.6.31.4 on the x86_64 platform does not clear certain kernel registers before a return to user mode, which allows local users to read register values from an earlier process by switching an ia32 process to 64-bit mode.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: x86_64 32 bit process register leak",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is not planned to be fixed in Red Hat Enterprise Linux 3, due to this product being in Production 3 of its maintenance life-cycle, where only qualified security errata of important and critical impact are addressed.\n\nFor further information about Errata Support Policy, visit: https://access.redhat.com/support/policy/updates/errata/",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-0:2.6.18-164.11.1.el5.src",
          "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-0:2.6.18-164.11.1.el5.src",
          "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-2910"
        },
        {
          "category": "external",
          "summary": "RHBZ#526788",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=526788"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2910",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-2910"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2910",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2910"
        }
      ],
      "release_date": "2009-10-01T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-01-19T23:30:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.11.1.el5.src",
            "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.11.1.el5.src",
            "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0046"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.11.1.el5.src",
            "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.11.1.el5.src",
            "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: x86_64 32 bit process register leak"
    },
    {
      "cve": "CVE-2009-3080",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2009-11-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "539414"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Array index error in the gdth_read_event function in drivers/scsi/gdth.c in the Linux kernel before 2.6.32-rc8 allows local users to cause a denial of service or possibly gain privileges via a negative event index in an IOCTL request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: gdth: Prevent negative offsets in ioctl",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-0:2.6.18-164.11.1.el5.src",
          "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-0:2.6.18-164.11.1.el5.src",
          "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3080"
        },
        {
          "category": "external",
          "summary": "RHBZ#539414",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539414"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3080",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3080"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3080",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3080"
        }
      ],
      "release_date": "2009-11-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-01-19T23:30:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.11.1.el5.src",
            "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.11.1.el5.src",
            "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0046"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.11.1.el5.src",
            "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.11.1.el5.src",
            "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: gdth: Prevent negative offsets in ioctl"
    },
    {
      "cve": "CVE-2009-3556",
      "cwe": {
        "id": "CWE-732",
        "name": "Incorrect Permission Assignment for Critical Resource"
      },
      "discovery_date": "2009-11-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "537177"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A certain Red Hat configuration step for the qla2xxx driver in the Linux kernel 2.6.18 on Red Hat Enterprise Linux (RHEL) 5, when N_Port ID Virtualization (NPIV) hardware is used, sets world-writable permissions for the (1) vport_create and (2) vport_delete files under /sys/class/scsi_host/, which allows local users to make arbitrary changes to SCSI host attributes by modifying these files.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: qla2xxx NPIV vport management pseudofiles are world writable",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 3, 4 and Red Hat Enterprise MRG. Shipped kernels do not include upstream commit d025c9db that introduced the problem.\n\nThis upstream commit was backported in Red Hat Enterprise Linux 5 via RHBA-2008:0314 update. Issue was addressed in Red Hat Enterprise Linux 5 via RHSA-2010:0046.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-0:2.6.18-164.11.1.el5.src",
          "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-0:2.6.18-164.11.1.el5.src",
          "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3556"
        },
        {
          "category": "external",
          "summary": "RHBZ#537177",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=537177"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3556",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3556"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3556",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3556"
        }
      ],
      "release_date": "2010-01-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-01-19T23:30:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.11.1.el5.src",
            "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.11.1.el5.src",
            "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0046"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 3.6,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.11.1.el5.src",
            "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.11.1.el5.src",
            "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: qla2xxx NPIV vport management pseudofiles are world writable"
    },
    {
      "cve": "CVE-2009-3889",
      "discovery_date": "2009-11-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "526068"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The dbg_lvl file for the megaraid_sas driver in the Linux kernel before 2.6.27 has world-writable permissions, which allows local users to change the (1) behavior and (2) logging level of the driver by modifying this file.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: megaraid_sas permissions in sysfs",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the version of the Linux kernel as shipped with Red Hat Enterprise Linux 3, as it does not implement the sysfs file system (\"/sys/\"), through which dbg_lvl file is exposed by the megaraid_sas driver.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-0:2.6.18-164.11.1.el5.src",
          "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-0:2.6.18-164.11.1.el5.src",
          "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3889"
        },
        {
          "category": "external",
          "summary": "RHBZ#526068",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=526068"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3889",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3889"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3889",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3889"
        }
      ],
      "release_date": "2009-09-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-01-19T23:30:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.11.1.el5.src",
            "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.11.1.el5.src",
            "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0046"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 3.6,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.11.1.el5.src",
            "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.11.1.el5.src",
            "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: megaraid_sas permissions in sysfs"
    },
    {
      "cve": "CVE-2009-3939",
      "discovery_date": "2009-11-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "526068"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The poll_mode_io file for the megaraid_sas driver in the Linux kernel 2.6.31.6 and earlier has world-writable permissions, which allows local users to change the I/O mode of the driver by modifying this file.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: megaraid_sas permissions in sysfs",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the version of the Linux kernel as shipped with Red Hat Enterprise Linux 3, as it does not implement the sysfs file system (\"/sys/\"), through which poll_mode_io file is exposed by the megaraid_sas driver.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-0:2.6.18-164.11.1.el5.src",
          "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-0:2.6.18-164.11.1.el5.src",
          "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3939"
        },
        {
          "category": "external",
          "summary": "RHBZ#526068",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=526068"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3939",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3939"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3939",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3939"
        }
      ],
      "release_date": "2009-09-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-01-19T23:30:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.11.1.el5.src",
            "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.11.1.el5.src",
            "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0046"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 3.6,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.11.1.el5.src",
            "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.11.1.el5.src",
            "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: megaraid_sas permissions in sysfs"
    },
    {
      "cve": "CVE-2009-4020",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2009-11-24T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "540736"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Stack-based buffer overflow in the hfs subsystem in the Linux kernel 2.6.32 allows remote attackers to have an unspecified impact via a crafted Hierarchical File System (HFS) filesystem, related to the hfs_readdir function in fs/hfs/dir.c.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: hfs buffer overflow",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the version of the Linux kernel as shipped with Red Hat Enterprise MRG as the affected driver is not enabled in this kernel.\n\nRed Hat Enterprise Linux 3 is now in Production 3 of the maintenance life-cycle, https://access.redhat.com/support/policy/updates/errata, and this issue is rated as having low impact, therefore the fix for this issue is not currently planned to be included in the future updates.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-0:2.6.18-164.11.1.el5.src",
          "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-0:2.6.18-164.11.1.el5.src",
          "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-4020"
        },
        {
          "category": "external",
          "summary": "RHBZ#540736",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=540736"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-4020",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-4020"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4020",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4020"
        }
      ],
      "release_date": "2009-12-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-01-19T23:30:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.11.1.el5.src",
            "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.11.1.el5.src",
            "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0046"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "HIGH",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.2,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.11.1.el5.src",
            "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.11.1.el5.src",
            "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: hfs buffer overflow"
    },
    {
      "cve": "CVE-2009-4021",
      "discovery_date": "2009-11-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "538734"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The fuse_direct_io function in fs/fuse/file.c in the fuse subsystem in the Linux kernel before 2.6.32-rc7 might allow attackers to cause a denial of service (invalid pointer dereference and OOPS) via vectors possibly related to a memory-consumption attack.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: fuse: prevent fuse_put_request on invalid pointer",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/CVE-2009-4021\n\nThe Linux kernel packages as shipped with Red Hat Enterprise Linux 3 and 4 do not include support for FUSE, and therefore are not affected by this issue.\n\nA future kernel update for Red Hat Enterprise MRG will address this flaw.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-0:2.6.18-164.11.1.el5.src",
          "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-0:2.6.18-164.11.1.el5.src",
          "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-4021"
        },
        {
          "category": "external",
          "summary": "RHBZ#538734",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=538734"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-4021",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-4021"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4021",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4021"
        }
      ],
      "release_date": "2009-10-22T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-01-19T23:30:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.11.1.el5.src",
            "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.11.1.el5.src",
            "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0046"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "SINGLE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.6,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.11.1.el5.src",
            "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.11.1.el5.src",
            "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: fuse: prevent fuse_put_request on invalid pointer"
    },
    {
      "cve": "CVE-2009-4138",
      "discovery_date": "2009-12-14T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "547236"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "drivers/firewire/ohci.c in the Linux kernel before 2.6.32-git9, when packet-per-buffer mode is used, allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unknown other impact via an unspecified ioctl associated with receiving an ISO packet that contains zero in the payload-length field.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: firewire: ohci: handle receive packets with a data length of zero",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/CVE-2009-4138\n\nThe Linux kernel packages as shipped with Red Hat Enterprise Linux 3 and 4 have a different (and older) implementation of the driver for OHCI 1394 controllers, which is not affected by this issue.\n\nA future kernel update for Red Hat Enterprise MRG will address this flaw.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-0:2.6.18-164.11.1.el5.src",
          "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-0:2.6.18-164.11.1.el5.src",
          "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-4138"
        },
        {
          "category": "external",
          "summary": "RHBZ#547236",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=547236"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-4138",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-4138"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4138",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4138"
        }
      ],
      "release_date": "2009-12-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-01-19T23:30:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.11.1.el5.src",
            "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.11.1.el5.src",
            "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0046"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "HIGH",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.0,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:H/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.11.1.el5.src",
            "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.11.1.el5.src",
            "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: firewire: ohci: handle receive packets with a data length of zero"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Tavis Ormandy"
          ],
          "organization": "Google Security Team"
        }
      ],
      "cve": "CVE-2009-4141",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2009-12-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "547906"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Use-after-free vulnerability in the fasync_helper function in fs/fcntl.c in the Linux kernel before 2.6.33-rc4-git1 allows local users to gain privileges via vectors that include enabling O_ASYNC (aka FASYNC or FIOASYNC) on a locked file, and then closing this file.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: create_elf_tables can leave urandom in a bad state",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 3, 4 and Red Hat Enterprise MRG. Shipped kernels do not include upstream commit 233e70f4 that introduced the problem.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-0:2.6.18-164.11.1.el5.src",
          "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-0:2.6.18-164.11.1.el5.src",
          "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-4141"
        },
        {
          "category": "external",
          "summary": "RHBZ#547906",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=547906"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-4141",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-4141"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4141",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4141"
        }
      ],
      "release_date": "2009-12-16T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-01-19T23:30:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.11.1.el5.src",
            "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.11.1.el5.src",
            "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0046"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.11.1.el5.src",
            "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.11.1.el5.src",
            "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: create_elf_tables can leave urandom in a bad state"
    },
    {
      "cve": "CVE-2009-4272",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2009-12-08T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "545411"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A certain Red Hat patch for net/ipv4/route.c in the Linux kernel 2.6.18 on Red Hat Enterprise Linux (RHEL) 5 allows remote attackers to cause a denial of service (deadlock) via crafted packets that force collisions in the IPv4 routing hash table, and trigger a routing \"emergency\" in which a hash chain is too long.  NOTE: this is related to an issue in the Linux kernel before 2.6.31, when the kernel routing cache is disabled, involving an uninitialized pointer and a panic.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: emergency route cache flushing leads to node deadlock",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 3, 4 and Red Hat Enterprise MRG. Shipped kernels do not include upstream commits c6153b5b and 1080d709 that introduced the problem.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-0:2.6.18-164.11.1.el5.src",
          "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-0:2.6.18-164.11.1.el5.src",
          "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-4272"
        },
        {
          "category": "external",
          "summary": "RHBZ#545411",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=545411"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-4272",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-4272"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4272",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4272"
        }
      ],
      "release_date": "2010-01-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-01-19T23:30:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.11.1.el5.src",
            "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.11.1.el5.src",
            "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0046"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.8,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.11.1.el5.src",
            "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.11.1.el5.src",
            "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: emergency route cache flushing leads to node deadlock"
    }
  ]
}
  RHSA-2009:1671
Vulnerability from csaf_redhat
Published
2009-12-15 17:12
    Modified
2025-10-09 13:22
    Summary
Red Hat Security Advisory: kernel security and bug fix update
    Notes
Topic
Updated kernel packages that fix multiple security issues and several bugs
are now available for Red Hat Enterprise Linux 4.
This update has been rated as having important security impact by the Red
Hat Security Response Team.
    Details
The kernel packages contain the Linux kernel, the core of any Linux
operating system.
This update fixes the following security issues:
* a flaw was found in the Realtek r8169 Ethernet driver in the Linux
kernel. pci_unmap_single() presented a memory leak that could lead to IOMMU
space exhaustion and a system crash. An attacker on the local network could
trigger this flaw by using jumbo frames for large amounts of network
traffic. (CVE-2009-3613, Important)
* NULL pointer dereference flaws were found in the r128 driver in the Linux
kernel. Checks to test if the Concurrent Command Engine state was
initialized were missing in private IOCTL functions. An attacker could use
these flaws to cause a local denial of service or escalate their
privileges. (CVE-2009-3620, Important)
* an information leak was found in the Linux kernel. On AMD64 systems,
32-bit processes could access and read certain 64-bit registers by
temporarily switching themselves to 64-bit mode. (CVE-2009-2910, Moderate)
* the unix_stream_connect() function in the Linux kernel did not check if a
UNIX domain socket was in the shutdown state. This could lead to a
deadlock. A local, unprivileged user could use this flaw to cause a denial
of service. (CVE-2009-3621, Moderate)
This update also fixes the following bugs:
* an iptables rule with the recent module and a hit count value greater
than the ip_pkt_list_tot parameter (the default is 20), did not have any
effect over packets, as the hit count could not be reached. (BZ#529306)
* in environments that use dual-controller storage devices with the cciss
driver, Device-Mapper Multipath maps could not be detected and configured,
due to the cciss driver not exporting the bus attribute via sysfs. This
attribute is now exported. (BZ#529309)
* the kernel crashed with a divide error when a certain joystick was
attached. (BZ#532027)
* a bug in the mptctl_do_mpt_command() function in the mpt driver may have
resulted in crashes during boot on i386 systems with certain adapters using
the mpt driver, and also running the hugemem kernel. (BZ#533798)
* on certain hardware, the igb driver was unable to detect link statuses
correctly. This may have caused problems for network bonding, such as
failover not occurring. (BZ#534105)
* the RHSA-2009:1024 update introduced a regression. After updating to Red
Hat Enterprise Linux 4.8 and rebooting, network links often failed to be
brought up for interfaces using the forcedeth driver. "no link during
initialization" messages may have been logged. (BZ#534112)
* the RHSA-2009:1024 update introduced a second regression. On certain
systems, PS/2 keyboards failed to work. (BZ#537344)
* a bug in checksum offload calculations could have crashed the bnx2x
firmware when the iptable_nat module was loaded, causing network traffic
to stop. (BZ#537013)
* a check has been added to the IPv4 code to make sure that the routing
table data structure, rt, is not NULL, to help prevent future bugs in
functions that call ip_append_data() from being exploitable. (BZ#537016)
* possible kernel pointer dereferences on systems with several NFS mounts
(a mixture of "-o lock" and "-o nolock"), which in rare cases may have
caused a system crash, have been resolved. (BZ#537017)
Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.
    Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
    {
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated kernel packages that fix multiple security issues and several bugs\nare now available for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues:\n\n* a flaw was found in the Realtek r8169 Ethernet driver in the Linux\nkernel. pci_unmap_single() presented a memory leak that could lead to IOMMU\nspace exhaustion and a system crash. An attacker on the local network could\ntrigger this flaw by using jumbo frames for large amounts of network\ntraffic. (CVE-2009-3613, Important)\n\n* NULL pointer dereference flaws were found in the r128 driver in the Linux\nkernel. Checks to test if the Concurrent Command Engine state was\ninitialized were missing in private IOCTL functions. An attacker could use\nthese flaws to cause a local denial of service or escalate their\nprivileges. (CVE-2009-3620, Important)\n\n* an information leak was found in the Linux kernel. On AMD64 systems,\n32-bit processes could access and read certain 64-bit registers by\ntemporarily switching themselves to 64-bit mode. (CVE-2009-2910, Moderate)\n\n* the unix_stream_connect() function in the Linux kernel did not check if a\nUNIX domain socket was in the shutdown state. This could lead to a\ndeadlock. A local, unprivileged user could use this flaw to cause a denial\nof service. (CVE-2009-3621, Moderate)\n\nThis update also fixes the following bugs:\n\n* an iptables rule with the recent module and a hit count value greater\nthan the ip_pkt_list_tot parameter (the default is 20), did not have any\neffect over packets, as the hit count could not be reached. (BZ#529306)\n\n* in environments that use dual-controller storage devices with the cciss\ndriver, Device-Mapper Multipath maps could not be detected and configured,\ndue to the cciss driver not exporting the bus attribute via sysfs. This\nattribute is now exported. (BZ#529309)\n\n* the kernel crashed with a divide error when a certain joystick was\nattached. (BZ#532027)\n\n* a bug in the mptctl_do_mpt_command() function in the mpt driver may have\nresulted in crashes during boot on i386 systems with certain adapters using\nthe mpt driver, and also running the hugemem kernel. (BZ#533798)\n\n* on certain hardware, the igb driver was unable to detect link statuses\ncorrectly. This may have caused problems for network bonding, such as\nfailover not occurring. (BZ#534105)\n\n* the RHSA-2009:1024 update introduced a regression. After updating to Red\nHat Enterprise Linux 4.8 and rebooting, network links often failed to be\nbrought up for interfaces using the forcedeth driver. \"no link during\ninitialization\" messages may have been logged. (BZ#534112)\n\n* the RHSA-2009:1024 update introduced a second regression. On certain\nsystems, PS/2 keyboards failed to work. (BZ#537344)\n\n* a bug in checksum offload calculations could have crashed the bnx2x\nfirmware when the iptable_nat module was loaded, causing network traffic\nto stop. (BZ#537013)\n\n* a check has been added to the IPv4 code to make sure that the routing\ntable data structure, rt, is not NULL, to help prevent future bugs in\nfunctions that call ip_append_data() from being exploitable. (BZ#537016)\n\n* possible kernel pointer dereferences on systems with several NFS mounts\n(a mixture of \"-o lock\" and \"-o nolock\"), which in rare cases may have\ncaused a system crash, have been resolved. (BZ#537017)\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2009:1671",
        "url": "https://access.redhat.com/errata/RHSA-2009:1671"
      },
      {
        "category": "external",
        "summary": "532027",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=532027"
      },
      {
        "category": "external",
        "summary": "533798",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533798"
      },
      {
        "category": "external",
        "summary": "534105",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=534105"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "526788",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=526788"
      },
      {
        "category": "external",
        "summary": "529137",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529137"
      },
      {
        "category": "external",
        "summary": "529306",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529306"
      },
      {
        "category": "external",
        "summary": "529309",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529309"
      },
      {
        "category": "external",
        "summary": "529597",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529597"
      },
      {
        "category": "external",
        "summary": "529626",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529626"
      },
      {
        "category": "external",
        "summary": "534112",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=534112"
      },
      {
        "category": "external",
        "summary": "537013",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=537013"
      },
      {
        "category": "external",
        "summary": "537016",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=537016"
      },
      {
        "category": "external",
        "summary": "537017",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=537017"
      },
      {
        "category": "external",
        "summary": "537344",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=537344"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1671.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security and bug fix update",
    "tracking": {
      "current_release_date": "2025-10-09T13:22:13+00:00",
      "generator": {
        "date": "2025-10-09T13:22:13+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2009:1671",
      "initial_release_date": "2009-12-15T17:12:00+00:00",
      "revision_history": [
        {
          "date": "2009-12-15T17:12:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2009-12-15T12:18:22+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T13:22:13+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AS version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux AS version 4",
                  "product_id": "4AS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::as"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Desktop version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux Desktop version 4",
                  "product_id": "4Desktop",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux ES version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux ES version 4",
                  "product_id": "4ES",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::es"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux WS version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux WS version 4",
                  "product_id": "4WS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
                  "product_id": "kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.18.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
                "product": {
                  "name": "kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
                  "product_id": "kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-hugemem@2.6.9-89.0.18.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-89.0.18.EL.i686",
                "product": {
                  "name": "kernel-devel-0:2.6.9-89.0.18.EL.i686",
                  "product_id": "kernel-devel-0:2.6.9-89.0.18.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.18.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
                "product": {
                  "name": "kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
                  "product_id": "kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-89.0.18.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
                "product": {
                  "name": "kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
                  "product_id": "kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-hugemem-devel@2.6.9-89.0.18.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
                "product": {
                  "name": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
                  "product_id": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xenU-devel@2.6.9-89.0.18.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-89.0.18.EL.i686",
                "product": {
                  "name": "kernel-0:2.6.9-89.0.18.EL.i686",
                  "product_id": "kernel-0:2.6.9-89.0.18.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.18.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-smp-0:2.6.9-89.0.18.EL.i686",
                "product": {
                  "name": "kernel-smp-0:2.6.9-89.0.18.EL.i686",
                  "product_id": "kernel-smp-0:2.6.9-89.0.18.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-smp@2.6.9-89.0.18.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xenU-0:2.6.9-89.0.18.EL.i686",
                "product": {
                  "name": "kernel-xenU-0:2.6.9-89.0.18.EL.i686",
                  "product_id": "kernel-xenU-0:2.6.9-89.0.18.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xenU@2.6.9-89.0.18.EL?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
                  "product_id": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.18.EL?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
                "product": {
                  "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
                  "product_id": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-89.0.18.EL?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-89.0.18.EL.ia64",
                "product": {
                  "name": "kernel-devel-0:2.6.9-89.0.18.EL.ia64",
                  "product_id": "kernel-devel-0:2.6.9-89.0.18.EL.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.18.EL?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-89.0.18.EL.ia64",
                "product": {
                  "name": "kernel-0:2.6.9-89.0.18.EL.ia64",
                  "product_id": "kernel-0:2.6.9-89.0.18.EL.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.18.EL?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
                "product": {
                  "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
                  "product_id": "kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-89.0.18.EL?arch=ia64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ia64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
                  "product_id": "kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.18.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
                "product": {
                  "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
                  "product_id": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-89.0.18.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
                "product": {
                  "name": "kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
                  "product_id": "kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.18.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
                "product": {
                  "name": "kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
                  "product_id": "kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-89.0.18.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
                "product": {
                  "name": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
                  "product_id": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xenU-devel@2.6.9-89.0.18.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-89.0.18.EL.x86_64",
                "product": {
                  "name": "kernel-0:2.6.9-89.0.18.EL.x86_64",
                  "product_id": "kernel-0:2.6.9-89.0.18.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.18.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
                "product": {
                  "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
                  "product_id": "kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-89.0.18.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
                "product": {
                  "name": "kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
                  "product_id": "kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-smp@2.6.9-89.0.18.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
                "product": {
                  "name": "kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
                  "product_id": "kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xenU@2.6.9-89.0.18.EL?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-89.0.18.EL.src",
                "product": {
                  "name": "kernel-0:2.6.9-89.0.18.EL.src",
                  "product_id": "kernel-0:2.6.9-89.0.18.EL.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.18.EL?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-doc-0:2.6.9-89.0.18.EL.noarch",
                "product": {
                  "name": "kernel-doc-0:2.6.9-89.0.18.EL.noarch",
                  "product_id": "kernel-doc-0:2.6.9-89.0.18.EL.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@2.6.9-89.0.18.EL?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
                  "product_id": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.18.EL?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
                "product": {
                  "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
                  "product_id": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-89.0.18.EL?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
                "product": {
                  "name": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
                  "product_id": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.18.EL?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-89.0.18.EL.ppc64",
                "product": {
                  "name": "kernel-0:2.6.9-89.0.18.EL.ppc64",
                  "product_id": "kernel-0:2.6.9-89.0.18.EL.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.18.EL?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
                "product": {
                  "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
                  "product_id": "kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-89.0.18.EL?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
                  "product_id": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.18.EL?arch=ppc64iseries"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
                "product": {
                  "name": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
                  "product_id": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.18.EL?arch=ppc64iseries"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
                "product": {
                  "name": "kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
                  "product_id": "kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.18.EL?arch=ppc64iseries"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64iseries"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
                  "product_id": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.18.EL?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-89.0.18.EL.s390x",
                "product": {
                  "name": "kernel-devel-0:2.6.9-89.0.18.EL.s390x",
                  "product_id": "kernel-devel-0:2.6.9-89.0.18.EL.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.18.EL?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-89.0.18.EL.s390x",
                "product": {
                  "name": "kernel-0:2.6.9-89.0.18.EL.s390x",
                  "product_id": "kernel-0:2.6.9-89.0.18.EL.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.18.EL?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
                  "product_id": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.18.EL?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-89.0.18.EL.s390",
                "product": {
                  "name": "kernel-devel-0:2.6.9-89.0.18.EL.s390",
                  "product_id": "kernel-devel-0:2.6.9-89.0.18.EL.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.18.EL?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-89.0.18.EL.s390",
                "product": {
                  "name": "kernel-0:2.6.9-89.0.18.EL.s390",
                  "product_id": "kernel-0:2.6.9-89.0.18.EL.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.18.EL?arch=s390"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.s390 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-89.0.18.EL.s390"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.s390",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.s390x as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-89.0.18.EL.s390x"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.s390x",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.src as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-89.0.18.EL.src"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.src",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.s390 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.s390",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.s390x as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.s390x",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.9-89.0.18.EL.noarch as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-doc-0:2.6.9-89.0.18.EL.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.9-89.0.18.EL.noarch",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-smp-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-smp-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-xenU-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64iseries"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.s390",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390x"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.s390x",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.src as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-89.0.18.EL.src"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.src",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.s390",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.s390x",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.9-89.0.18.EL.noarch as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-doc-0:2.6.9-89.0.18.EL.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.9-89.0.18.EL.noarch",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-hugemem-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-smp-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-xenU-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64iseries"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.s390 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-89.0.18.EL.s390"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.s390",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.s390x as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-89.0.18.EL.s390x"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.s390x",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.src as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-89.0.18.EL.src"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.src",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.s390 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.s390",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.s390x as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.s390x",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.9-89.0.18.EL.noarch as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-doc-0:2.6.9-89.0.18.EL.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.9-89.0.18.EL.noarch",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-hugemem-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-smp-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-smp-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-smp-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-xenU-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.s390 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-89.0.18.EL.s390"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.s390",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.s390x as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-89.0.18.EL.s390x"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.s390x",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.src as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-89.0.18.EL.src"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.src",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.s390 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.s390",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.s390x as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.s390x",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.9-89.0.18.EL.noarch as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-doc-0:2.6.9-89.0.18.EL.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.9-89.0.18.EL.noarch",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-smp-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-smp-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-xenU-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4WS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2009-2910",
      "discovery_date": "2009-10-01T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "526788"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "arch/x86/ia32/ia32entry.S in the Linux kernel before 2.6.31.4 on the x86_64 platform does not clear certain kernel registers before a return to user mode, which allows local users to read register values from an earlier process by switching an ia32 process to 64-bit mode.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: x86_64 32 bit process register leak",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is not planned to be fixed in Red Hat Enterprise Linux 3, due to this product being in Production 3 of its maintenance life-cycle, where only qualified security errata of important and critical impact are addressed.\n\nFor further information about Errata Support Policy, visit: https://access.redhat.com/support/policy/updates/errata/",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:kernel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4AS:kernel-0:2.6.9-89.0.18.EL.s390",
          "4AS:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4AS:kernel-0:2.6.9-89.0.18.EL.src",
          "4AS:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4AS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.src",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4Desktop:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4ES:kernel-0:2.6.9-89.0.18.EL.s390",
          "4ES:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4ES:kernel-0:2.6.9-89.0.18.EL.src",
          "4ES:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4ES:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4WS:kernel-0:2.6.9-89.0.18.EL.s390",
          "4WS:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4WS:kernel-0:2.6.9-89.0.18.EL.src",
          "4WS:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4WS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-2910"
        },
        {
          "category": "external",
          "summary": "RHBZ#526788",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=526788"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2910",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-2910"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2910",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2910"
        }
      ],
      "release_date": "2009-10-01T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-12-15T17:12:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-0:2.6.9-89.0.18.EL.src",
            "4AS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.src",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-0:2.6.9-89.0.18.EL.src",
            "4ES:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-0:2.6.9-89.0.18.EL.src",
            "4WS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1671"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "products": [
            "4AS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-0:2.6.9-89.0.18.EL.src",
            "4AS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.src",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-0:2.6.9-89.0.18.EL.src",
            "4ES:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-0:2.6.9-89.0.18.EL.src",
            "4WS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: x86_64 32 bit process register leak"
    },
    {
      "cve": "CVE-2009-3613",
      "discovery_date": "2009-10-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "529137"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The swiotlb functionality in the r8169 driver in drivers/net/r8169.c in the Linux kernel before 2.6.27.22 allows remote attackers to cause a denial of service (IOMMU space exhaustion and system crash) by using jumbo frames for a large amount of network traffic, as demonstrated by a flood ping.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: flood ping cause out-of-iommu error and panic when mtu larger than 1500",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:kernel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4AS:kernel-0:2.6.9-89.0.18.EL.s390",
          "4AS:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4AS:kernel-0:2.6.9-89.0.18.EL.src",
          "4AS:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4AS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.src",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4Desktop:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4ES:kernel-0:2.6.9-89.0.18.EL.s390",
          "4ES:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4ES:kernel-0:2.6.9-89.0.18.EL.src",
          "4ES:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4ES:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4WS:kernel-0:2.6.9-89.0.18.EL.s390",
          "4WS:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4WS:kernel-0:2.6.9-89.0.18.EL.src",
          "4WS:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4WS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3613"
        },
        {
          "category": "external",
          "summary": "RHBZ#529137",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529137"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3613",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3613"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3613",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3613"
        }
      ],
      "release_date": "2007-11-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-12-15T17:12:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-0:2.6.9-89.0.18.EL.src",
            "4AS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.src",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-0:2.6.9-89.0.18.EL.src",
            "4ES:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-0:2.6.9-89.0.18.EL.src",
            "4WS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1671"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "4AS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-0:2.6.9-89.0.18.EL.src",
            "4AS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.src",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-0:2.6.9-89.0.18.EL.src",
            "4ES:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-0:2.6.9-89.0.18.EL.src",
            "4WS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: flood ping cause out-of-iommu error and panic when mtu larger than 1500"
    },
    {
      "cve": "CVE-2009-3620",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2009-10-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "529597"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The ATI Rage 128 (aka r128) driver in the Linux kernel before 2.6.31-git11 does not properly verify Concurrent Command Engine (CCE) state initialization, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly gain privileges via unspecified ioctl calls.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: r128 IOCTL NULL pointer dereferences when CCE state is uninitialised",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:kernel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4AS:kernel-0:2.6.9-89.0.18.EL.s390",
          "4AS:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4AS:kernel-0:2.6.9-89.0.18.EL.src",
          "4AS:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4AS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.src",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4Desktop:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4ES:kernel-0:2.6.9-89.0.18.EL.s390",
          "4ES:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4ES:kernel-0:2.6.9-89.0.18.EL.src",
          "4ES:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4ES:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4WS:kernel-0:2.6.9-89.0.18.EL.s390",
          "4WS:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4WS:kernel-0:2.6.9-89.0.18.EL.src",
          "4WS:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4WS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3620"
        },
        {
          "category": "external",
          "summary": "RHBZ#529597",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529597"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3620",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3620"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3620",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3620"
        }
      ],
      "release_date": "2009-08-30T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-12-15T17:12:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-0:2.6.9-89.0.18.EL.src",
            "4AS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.src",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-0:2.6.9-89.0.18.EL.src",
            "4ES:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-0:2.6.9-89.0.18.EL.src",
            "4WS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1671"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.9,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "4AS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-0:2.6.9-89.0.18.EL.src",
            "4AS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.src",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-0:2.6.9-89.0.18.EL.src",
            "4ES:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-0:2.6.9-89.0.18.EL.src",
            "4WS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: r128 IOCTL NULL pointer dereferences when CCE state is uninitialised"
    },
    {
      "cve": "CVE-2009-3621",
      "discovery_date": "2009-10-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "529626"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "net/unix/af_unix.c in the Linux kernel 2.6.31.4 and earlier allows local users to cause a denial of service (system hang) by creating an abstract-namespace AF_UNIX listening socket, performing a shutdown operation on this socket, and then performing a series of connect operations to this socket.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: AF_UNIX: Fix deadlock on connecting to shutdown socket",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is not planned to be fixed in Red Hat Enterprise Linux 3, due to this product being in Production 3 of its maintenance life-cycle, where only qualified security errata of important or critical impact are addressed.\n\nFor further information about Errata Support Policy, visit: https://access.redhat.com/support/policy/updates/errata/",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:kernel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4AS:kernel-0:2.6.9-89.0.18.EL.s390",
          "4AS:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4AS:kernel-0:2.6.9-89.0.18.EL.src",
          "4AS:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4AS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.src",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4Desktop:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4ES:kernel-0:2.6.9-89.0.18.EL.s390",
          "4ES:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4ES:kernel-0:2.6.9-89.0.18.EL.src",
          "4ES:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4ES:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4WS:kernel-0:2.6.9-89.0.18.EL.s390",
          "4WS:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4WS:kernel-0:2.6.9-89.0.18.EL.src",
          "4WS:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4WS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3621"
        },
        {
          "category": "external",
          "summary": "RHBZ#529626",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529626"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3621",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3621"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3621",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3621"
        }
      ],
      "release_date": "2009-10-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-12-15T17:12:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-0:2.6.9-89.0.18.EL.src",
            "4AS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.src",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-0:2.6.9-89.0.18.EL.src",
            "4ES:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-0:2.6.9-89.0.18.EL.src",
            "4WS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1671"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.9,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "4AS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-0:2.6.9-89.0.18.EL.src",
            "4AS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.src",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-0:2.6.9-89.0.18.EL.src",
            "4ES:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-0:2.6.9-89.0.18.EL.src",
            "4WS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: AF_UNIX: Fix deadlock on connecting to shutdown socket"
    }
  ]
}
  RHSA-2010:0046
Vulnerability from csaf_redhat
Published
2010-01-19 23:30
    Modified
2025-10-09 12:58
    Summary
Red Hat Security Advisory: kernel security and bug fix update
    Notes
Topic
Updated kernel packages that fix multiple security issues and several bugs
are now available for Red Hat Enterprise Linux 5.
This update has been rated as having important security impact by the Red
Hat Security Response Team.
    Details
The kernel packages contain the Linux kernel, the core of any Linux
operating system.
Security fixes:
* an array index error was found in the gdth driver. A local user could
send a specially-crafted IOCTL request that would cause a denial of service
or, possibly, privilege escalation. (CVE-2009-3080, Important)
* a flaw was found in the FUSE implementation. When a system is low on
memory, fuse_put_request() could dereference an invalid pointer, possibly
leading to a local denial of service or privilege escalation.
(CVE-2009-4021, Important)
* Tavis Ormandy discovered a deficiency in the fasync_helper()
implementation. This could allow a local, unprivileged user to leverage a
use-after-free of locked, asynchronous file descriptors to cause a denial
of service or privilege escalation. (CVE-2009-4141, Important)
* the Parallels Virtuozzo Containers team reported the RHSA-2009:1243
update introduced two flaws in the routing implementation. If an attacker
was able to cause a large enough number of collisions in the routing hash
table (via specially-crafted packets) for the emergency route flush to
trigger, a deadlock could occur. Secondly, if the kernel routing cache was
disabled, an uninitialized pointer would be left behind after a route
lookup, leading to a kernel panic. (CVE-2009-4272, Important)
* the RHSA-2009:0225 update introduced a rewrite attack flaw in the
do_coredump() function. A local attacker able to guess the file name a
process is going to dump its core to, prior to the process crashing, could
use this flaw to append data to the dumped core file. This issue only
affects systems that have "/proc/sys/fs/suid_dumpable" set to 2 (the
default value is 0). (CVE-2006-6304, Moderate)
The fix for CVE-2006-6304 changes the expected behavior: With suid_dumpable
set to 2, the core file will not be recorded if the file already exists.
For example, core files will not be overwritten on subsequent crashes of
processes whose core files map to the same name.
* an information leak was found in the Linux kernel. On AMD64 systems,
32-bit processes could access and read certain 64-bit registers by
temporarily switching themselves to 64-bit mode. (CVE-2009-2910, Moderate)
* the RHBA-2008:0314 update introduced N_Port ID Virtualization (NPIV)
support in the qla2xxx driver, resulting in two new sysfs pseudo files,
"/sys/class/scsi_host/[a qla2xxx host]/vport_create" and "vport_delete".
These two files were world-writable by default, allowing a local user to
change SCSI host attributes. This flaw only affects systems using the
qla2xxx driver and NPIV capable hardware. (CVE-2009-3556, Moderate)
* permission issues were found in the megaraid_sas driver. The "dbg_lvl"
and "poll_mode_io" files on the sysfs file system ("/sys/") had
world-writable permissions. This could allow local, unprivileged users to
change the behavior of the driver. (CVE-2009-3889, CVE-2009-3939, Moderate)
* a NULL pointer dereference flaw was found in the firewire-ohci driver
used for OHCI compliant IEEE 1394 controllers. A local, unprivileged user
with access to /dev/fw* files could issue certain IOCTL calls, causing a
denial of service or privilege escalation. The FireWire modules are
blacklisted by default, and if enabled, only root has access to the files
noted above by default. (CVE-2009-4138, Moderate)
* a buffer overflow flaw was found in the hfs_bnode_read() function in the
HFS file system implementation. This could lead to a denial of service if a
user browsed a specially-crafted HFS file system, for example, by running
"ls". (CVE-2009-4020, Low)
Bug fix documentation for this update will be available shortly from
www.redhat.com/docs/en-US/errata/RHSA-2010-0046/Kernel_Security_Update/
index.html
Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.
    Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
    {
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated kernel packages that fix multiple security issues and several bugs\nare now available for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nSecurity fixes:\n\n* an array index error was found in the gdth driver. A local user could\nsend a specially-crafted IOCTL request that would cause a denial of service\nor, possibly, privilege escalation. (CVE-2009-3080, Important)\n\n* a flaw was found in the FUSE implementation. When a system is low on\nmemory, fuse_put_request() could dereference an invalid pointer, possibly\nleading to a local denial of service or privilege escalation.\n(CVE-2009-4021, Important)\n\n* Tavis Ormandy discovered a deficiency in the fasync_helper()\nimplementation. This could allow a local, unprivileged user to leverage a\nuse-after-free of locked, asynchronous file descriptors to cause a denial\nof service or privilege escalation. (CVE-2009-4141, Important)\n\n* the Parallels Virtuozzo Containers team reported the RHSA-2009:1243\nupdate introduced two flaws in the routing implementation. If an attacker\nwas able to cause a large enough number of collisions in the routing hash\ntable (via specially-crafted packets) for the emergency route flush to\ntrigger, a deadlock could occur. Secondly, if the kernel routing cache was\ndisabled, an uninitialized pointer would be left behind after a route\nlookup, leading to a kernel panic. (CVE-2009-4272, Important)\n\n* the RHSA-2009:0225 update introduced a rewrite attack flaw in the\ndo_coredump() function. A local attacker able to guess the file name a\nprocess is going to dump its core to, prior to the process crashing, could\nuse this flaw to append data to the dumped core file. This issue only\naffects systems that have \"/proc/sys/fs/suid_dumpable\" set to 2 (the\ndefault value is 0). (CVE-2006-6304, Moderate)\n\nThe fix for CVE-2006-6304 changes the expected behavior: With suid_dumpable\nset to 2, the core file will not be recorded if the file already exists.\nFor example, core files will not be overwritten on subsequent crashes of\nprocesses whose core files map to the same name.\n\n* an information leak was found in the Linux kernel. On AMD64 systems,\n32-bit processes could access and read certain 64-bit registers by\ntemporarily switching themselves to 64-bit mode. (CVE-2009-2910, Moderate)\n\n* the RHBA-2008:0314 update introduced N_Port ID Virtualization (NPIV)\nsupport in the qla2xxx driver, resulting in two new sysfs pseudo files,\n\"/sys/class/scsi_host/[a qla2xxx host]/vport_create\" and \"vport_delete\".\nThese two files were world-writable by default, allowing a local user to\nchange SCSI host attributes. This flaw only affects systems using the\nqla2xxx driver and NPIV capable hardware. (CVE-2009-3556, Moderate)\n\n* permission issues were found in the megaraid_sas driver. The \"dbg_lvl\"\nand \"poll_mode_io\" files on the sysfs file system (\"/sys/\") had\nworld-writable permissions. This could allow local, unprivileged users to\nchange the behavior of the driver. (CVE-2009-3889, CVE-2009-3939, Moderate)\n\n* a NULL pointer dereference flaw was found in the firewire-ohci driver\nused for OHCI compliant IEEE 1394 controllers. A local, unprivileged user\nwith access to /dev/fw* files could issue certain IOCTL calls, causing a\ndenial of service or privilege escalation. The FireWire modules are\nblacklisted by default, and if enabled, only root has access to the files\nnoted above by default. (CVE-2009-4138, Moderate)\n\n* a buffer overflow flaw was found in the hfs_bnode_read() function in the\nHFS file system implementation. This could lead to a denial of service if a\nuser browsed a specially-crafted HFS file system, for example, by running\n\"ls\". (CVE-2009-4020, Low)\n\nBug fix documentation for this update will be available shortly from\nwww.redhat.com/docs/en-US/errata/RHSA-2010-0046/Kernel_Security_Update/\nindex.html\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2010:0046",
        "url": "https://access.redhat.com/errata/RHSA-2010:0046"
      },
      {
        "category": "external",
        "summary": "543448",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=543448"
      },
      {
        "category": "external",
        "summary": "544978",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=544978"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "http://kbase.redhat.com/faq/docs/DOC-20536",
        "url": "http://kbase.redhat.com/faq/docs/DOC-20536"
      },
      {
        "category": "external",
        "summary": "526068",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=526068"
      },
      {
        "category": "external",
        "summary": "526788",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=526788"
      },
      {
        "category": "external",
        "summary": "537027",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=537027"
      },
      {
        "category": "external",
        "summary": "537177",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=537177"
      },
      {
        "category": "external",
        "summary": "537273",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=537273"
      },
      {
        "category": "external",
        "summary": "538734",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=538734"
      },
      {
        "category": "external",
        "summary": "539414",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539414"
      },
      {
        "category": "external",
        "summary": "539686",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539686"
      },
      {
        "category": "external",
        "summary": "540736",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=540736"
      },
      {
        "category": "external",
        "summary": "540896",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=540896"
      },
      {
        "category": "external",
        "summary": "542582",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=542582"
      },
      {
        "category": "external",
        "summary": "545411",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=545411"
      },
      {
        "category": "external",
        "summary": "547236",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=547236"
      },
      {
        "category": "external",
        "summary": "547521",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=547521"
      },
      {
        "category": "external",
        "summary": "547530",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=547530"
      },
      {
        "category": "external",
        "summary": "547906",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=547906"
      },
      {
        "category": "external",
        "summary": "548370",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=548370"
      },
      {
        "category": "external",
        "summary": "549905",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=549905"
      },
      {
        "category": "external",
        "summary": "549906",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=549906"
      },
      {
        "category": "external",
        "summary": "549907",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=549907"
      },
      {
        "category": "external",
        "summary": "549908",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=549908"
      },
      {
        "category": "external",
        "summary": "550968",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=550968"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0046.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security and bug fix update",
    "tracking": {
      "current_release_date": "2025-10-09T12:58:02+00:00",
      "generator": {
        "date": "2025-10-09T12:58:02+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2010:0046",
      "initial_release_date": "2010-01-19T23:30:00+00:00",
      "revision_history": [
        {
          "date": "2010-01-19T23:30:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2010-01-19T18:36:43+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T12:58:02+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
                "product": {
                  "name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
                  "product_id": "5Client",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:5::client"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux (v. 5 server)",
                "product": {
                  "name": "Red Hat Enterprise Linux (v. 5 server)",
                  "product_id": "5Server",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:5::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-PAE-0:2.6.18-164.11.1.el5.i686",
                "product": {
                  "name": "kernel-PAE-0:2.6.18-164.11.1.el5.i686",
                  "product_id": "kernel-PAE-0:2.6.18-164.11.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-164.11.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-164.11.1.el5.i686",
                "product": {
                  "name": "kernel-devel-0:2.6.18-164.11.1.el5.i686",
                  "product_id": "kernel-devel-0:2.6.18-164.11.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-164.11.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
                "product": {
                  "name": "kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
                  "product_id": "kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-164.11.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-0:2.6.18-164.11.1.el5.i686",
                "product": {
                  "name": "kernel-xen-0:2.6.18-164.11.1.el5.i686",
                  "product_id": "kernel-xen-0:2.6.18-164.11.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-164.11.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
                  "product_id": "kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-164.11.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
                "product": {
                  "name": "kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
                  "product_id": "kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-164.11.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-164.11.1.el5.i686",
                "product": {
                  "name": "kernel-0:2.6.18-164.11.1.el5.i686",
                  "product_id": "kernel-0:2.6.18-164.11.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-164.11.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
                  "product_id": "kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-164.11.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
                "product": {
                  "name": "kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
                  "product_id": "kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-164.11.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-164.11.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-164.11.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
                "product": {
                  "name": "kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
                  "product_id": "kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-164.11.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-164.11.1.el5.i686",
                "product": {
                  "name": "kernel-debug-0:2.6.18-164.11.1.el5.i686",
                  "product_id": "kernel-debug-0:2.6.18-164.11.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-164.11.1.el5?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-164.11.1.el5.i386",
                "product": {
                  "name": "kernel-headers-0:2.6.18-164.11.1.el5.i386",
                  "product_id": "kernel-headers-0:2.6.18-164.11.1.el5.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-164.11.1.el5?arch=i386"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i386"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
                "product": {
                  "name": "kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
                  "product_id": "kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-164.11.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
                "product": {
                  "name": "kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
                  "product_id": "kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-164.11.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
                "product": {
                  "name": "kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
                  "product_id": "kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-164.11.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
                  "product_id": "kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-164.11.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-164.11.1.el5.x86_64",
                "product": {
                  "name": "kernel-0:2.6.18-164.11.1.el5.x86_64",
                  "product_id": "kernel-0:2.6.18-164.11.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-164.11.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
                  "product_id": "kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-164.11.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
                "product": {
                  "name": "kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
                  "product_id": "kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-164.11.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-164.11.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
                "product": {
                  "name": "kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
                  "product_id": "kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-164.11.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-164.11.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
                "product": {
                  "name": "kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
                  "product_id": "kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-164.11.1.el5?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-doc-0:2.6.18-164.11.1.el5.noarch",
                "product": {
                  "name": "kernel-doc-0:2.6.18-164.11.1.el5.noarch",
                  "product_id": "kernel-doc-0:2.6.18-164.11.1.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@2.6.18-164.11.1.el5?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-164.11.1.el5.src",
                "product": {
                  "name": "kernel-0:2.6.18-164.11.1.el5.src",
                  "product_id": "kernel-0:2.6.18-164.11.1.el5.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-164.11.1.el5?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-164.11.1.el5.ia64",
                "product": {
                  "name": "kernel-devel-0:2.6.18-164.11.1.el5.ia64",
                  "product_id": "kernel-devel-0:2.6.18-164.11.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-164.11.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
                "product": {
                  "name": "kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
                  "product_id": "kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-164.11.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-0:2.6.18-164.11.1.el5.ia64",
                "product": {
                  "name": "kernel-xen-0:2.6.18-164.11.1.el5.ia64",
                  "product_id": "kernel-xen-0:2.6.18-164.11.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-164.11.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
                  "product_id": "kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-164.11.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-164.11.1.el5.ia64",
                "product": {
                  "name": "kernel-0:2.6.18-164.11.1.el5.ia64",
                  "product_id": "kernel-0:2.6.18-164.11.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-164.11.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
                  "product_id": "kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-164.11.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
                "product": {
                  "name": "kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
                  "product_id": "kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-164.11.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-164.11.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-164.11.1.el5.ia64",
                "product": {
                  "name": "kernel-headers-0:2.6.18-164.11.1.el5.ia64",
                  "product_id": "kernel-headers-0:2.6.18-164.11.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-164.11.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-164.11.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-164.11.1.el5.ia64",
                "product": {
                  "name": "kernel-debug-0:2.6.18-164.11.1.el5.ia64",
                  "product_id": "kernel-debug-0:2.6.18-164.11.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-164.11.1.el5?arch=ia64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ia64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
                "product": {
                  "name": "kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
                  "product_id": "kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-164.11.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
                "product": {
                  "name": "kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
                  "product_id": "kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-164.11.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
                  "product_id": "kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-164.11.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-164.11.1.el5.ppc64",
                "product": {
                  "name": "kernel-0:2.6.18-164.11.1.el5.ppc64",
                  "product_id": "kernel-0:2.6.18-164.11.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-164.11.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
                "product": {
                  "name": "kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
                  "product_id": "kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-164.11.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
                  "product_id": "kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-164.11.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-164.11.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
                "product": {
                  "name": "kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
                  "product_id": "kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-164.11.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-164.11.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
                "product": {
                  "name": "kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
                  "product_id": "kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-164.11.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
                "product": {
                  "name": "kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
                  "product_id": "kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-164.11.1.el5?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-164.11.1.el5.ppc",
                "product": {
                  "name": "kernel-headers-0:2.6.18-164.11.1.el5.ppc",
                  "product_id": "kernel-headers-0:2.6.18-164.11.1.el5.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-164.11.1.el5?arch=ppc"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-164.11.1.el5.s390x",
                "product": {
                  "name": "kernel-devel-0:2.6.18-164.11.1.el5.s390x",
                  "product_id": "kernel-devel-0:2.6.18-164.11.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-164.11.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
                "product": {
                  "name": "kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
                  "product_id": "kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-164.11.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
                  "product_id": "kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-164.11.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-164.11.1.el5.s390x",
                "product": {
                  "name": "kernel-0:2.6.18-164.11.1.el5.s390x",
                  "product_id": "kernel-0:2.6.18-164.11.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-164.11.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
                "product": {
                  "name": "kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
                  "product_id": "kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-164.11.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
                  "product_id": "kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-164.11.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-164.11.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-164.11.1.el5.s390x",
                "product": {
                  "name": "kernel-headers-0:2.6.18-164.11.1.el5.s390x",
                  "product_id": "kernel-headers-0:2.6.18-164.11.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-164.11.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-164.11.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
                "product": {
                  "name": "kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
                  "product_id": "kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-164.11.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-164.11.1.el5.s390x",
                "product": {
                  "name": "kernel-debug-0:2.6.18-164.11.1.el5.s390x",
                  "product_id": "kernel-debug-0:2.6.18-164.11.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-164.11.1.el5?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-164.11.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-0:2.6.18-164.11.1.el5.i686"
        },
        "product_reference": "kernel-0:2.6.18-164.11.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-164.11.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-0:2.6.18-164.11.1.el5.ia64"
        },
        "product_reference": "kernel-0:2.6.18-164.11.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-164.11.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64"
        },
        "product_reference": "kernel-0:2.6.18-164.11.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-164.11.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-0:2.6.18-164.11.1.el5.s390x"
        },
        "product_reference": "kernel-0:2.6.18-164.11.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-164.11.1.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-0:2.6.18-164.11.1.el5.src"
        },
        "product_reference": "kernel-0:2.6.18-164.11.1.el5.src",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-164.11.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64"
        },
        "product_reference": "kernel-0:2.6.18-164.11.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-0:2.6.18-164.11.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686"
        },
        "product_reference": "kernel-PAE-0:2.6.18-164.11.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686"
        },
        "product_reference": "kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686"
        },
        "product_reference": "kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-164.11.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686"
        },
        "product_reference": "kernel-debug-0:2.6.18-164.11.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-164.11.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64"
        },
        "product_reference": "kernel-debug-0:2.6.18-164.11.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-164.11.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64"
        },
        "product_reference": "kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-164.11.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x"
        },
        "product_reference": "kernel-debug-0:2.6.18-164.11.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-164.11.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64"
        },
        "product_reference": "kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-164.11.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-164.11.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-164.11.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686"
        },
        "product_reference": "kernel-devel-0:2.6.18-164.11.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-164.11.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.18-164.11.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-164.11.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-164.11.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.18-164.11.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-164.11.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.18-164.11.1.el5.noarch as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.18-164.11.1.el5.noarch",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-164.11.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386"
        },
        "product_reference": "kernel-headers-0:2.6.18-164.11.1.el5.i386",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-164.11.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64"
        },
        "product_reference": "kernel-headers-0:2.6.18-164.11.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-164.11.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc"
        },
        "product_reference": "kernel-headers-0:2.6.18-164.11.1.el5.ppc",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-164.11.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64"
        },
        "product_reference": "kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-164.11.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x"
        },
        "product_reference": "kernel-headers-0:2.6.18-164.11.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-164.11.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64"
        },
        "product_reference": "kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:2.6.18-164.11.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64"
        },
        "product_reference": "kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:2.6.18-164.11.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x"
        },
        "product_reference": "kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64"
        },
        "product_reference": "kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64"
        },
        "product_reference": "kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-164.11.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686"
        },
        "product_reference": "kernel-xen-0:2.6.18-164.11.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-164.11.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64"
        },
        "product_reference": "kernel-xen-0:2.6.18-164.11.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-164.11.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64"
        },
        "product_reference": "kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-164.11.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-164.11.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-0:2.6.18-164.11.1.el5.i686"
        },
        "product_reference": "kernel-0:2.6.18-164.11.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-164.11.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-0:2.6.18-164.11.1.el5.ia64"
        },
        "product_reference": "kernel-0:2.6.18-164.11.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-164.11.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64"
        },
        "product_reference": "kernel-0:2.6.18-164.11.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-164.11.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-0:2.6.18-164.11.1.el5.s390x"
        },
        "product_reference": "kernel-0:2.6.18-164.11.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-164.11.1.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-0:2.6.18-164.11.1.el5.src"
        },
        "product_reference": "kernel-0:2.6.18-164.11.1.el5.src",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-164.11.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64"
        },
        "product_reference": "kernel-0:2.6.18-164.11.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-0:2.6.18-164.11.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686"
        },
        "product_reference": "kernel-PAE-0:2.6.18-164.11.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686"
        },
        "product_reference": "kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686"
        },
        "product_reference": "kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-164.11.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686"
        },
        "product_reference": "kernel-debug-0:2.6.18-164.11.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-164.11.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64"
        },
        "product_reference": "kernel-debug-0:2.6.18-164.11.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-164.11.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64"
        },
        "product_reference": "kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-164.11.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x"
        },
        "product_reference": "kernel-debug-0:2.6.18-164.11.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-164.11.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64"
        },
        "product_reference": "kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-164.11.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-164.11.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-164.11.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686"
        },
        "product_reference": "kernel-devel-0:2.6.18-164.11.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-164.11.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.18-164.11.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-164.11.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-164.11.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.18-164.11.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-164.11.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.18-164.11.1.el5.noarch as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.18-164.11.1.el5.noarch",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-164.11.1.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386"
        },
        "product_reference": "kernel-headers-0:2.6.18-164.11.1.el5.i386",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-164.11.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64"
        },
        "product_reference": "kernel-headers-0:2.6.18-164.11.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-164.11.1.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc"
        },
        "product_reference": "kernel-headers-0:2.6.18-164.11.1.el5.ppc",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-164.11.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64"
        },
        "product_reference": "kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-164.11.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x"
        },
        "product_reference": "kernel-headers-0:2.6.18-164.11.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-164.11.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64"
        },
        "product_reference": "kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:2.6.18-164.11.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64"
        },
        "product_reference": "kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:2.6.18-164.11.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x"
        },
        "product_reference": "kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64"
        },
        "product_reference": "kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64"
        },
        "product_reference": "kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-164.11.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686"
        },
        "product_reference": "kernel-xen-0:2.6.18-164.11.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-164.11.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64"
        },
        "product_reference": "kernel-xen-0:2.6.18-164.11.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-164.11.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64"
        },
        "product_reference": "kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-164.11.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2006-6304",
      "discovery_date": "2009-12-04T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "537273"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The do_coredump function in fs/exec.c in the Linux kernel 2.6.19 sets the flag variable to O_EXCL but does not use it, which allows context-dependent attackers to modify arbitrary files via a rewrite attack during a core dump.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use flag in do_coredump()",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 3, 4 and Red Hat Enterprise MRG. Shipped kernels do not include upstream commit d025c9db that introduced the problem.\n\nThis upstream commit was backported in Red Hat Enterprise Linux 5 via RHSA-2009:0225. It was later reported and addressed in Red Hat Enterprise Linux 5 via RHSA-2010:0046.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-0:2.6.18-164.11.1.el5.src",
          "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-0:2.6.18-164.11.1.el5.src",
          "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2006-6304"
        },
        {
          "category": "external",
          "summary": "RHBZ#537273",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=537273"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2006-6304",
          "url": "https://www.cve.org/CVERecord?id=CVE-2006-6304"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-6304",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-6304"
        }
      ],
      "release_date": "2009-11-12T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-01-19T23:30:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.11.1.el5.src",
            "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.11.1.el5.src",
            "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0046"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 1.9,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.11.1.el5.src",
            "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.11.1.el5.src",
            "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use flag in do_coredump()"
    },
    {
      "cve": "CVE-2009-2910",
      "discovery_date": "2009-10-01T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "526788"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "arch/x86/ia32/ia32entry.S in the Linux kernel before 2.6.31.4 on the x86_64 platform does not clear certain kernel registers before a return to user mode, which allows local users to read register values from an earlier process by switching an ia32 process to 64-bit mode.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: x86_64 32 bit process register leak",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is not planned to be fixed in Red Hat Enterprise Linux 3, due to this product being in Production 3 of its maintenance life-cycle, where only qualified security errata of important and critical impact are addressed.\n\nFor further information about Errata Support Policy, visit: https://access.redhat.com/support/policy/updates/errata/",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-0:2.6.18-164.11.1.el5.src",
          "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-0:2.6.18-164.11.1.el5.src",
          "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-2910"
        },
        {
          "category": "external",
          "summary": "RHBZ#526788",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=526788"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2910",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-2910"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2910",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2910"
        }
      ],
      "release_date": "2009-10-01T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-01-19T23:30:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.11.1.el5.src",
            "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.11.1.el5.src",
            "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0046"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.11.1.el5.src",
            "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.11.1.el5.src",
            "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: x86_64 32 bit process register leak"
    },
    {
      "cve": "CVE-2009-3080",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2009-11-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "539414"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Array index error in the gdth_read_event function in drivers/scsi/gdth.c in the Linux kernel before 2.6.32-rc8 allows local users to cause a denial of service or possibly gain privileges via a negative event index in an IOCTL request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: gdth: Prevent negative offsets in ioctl",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-0:2.6.18-164.11.1.el5.src",
          "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-0:2.6.18-164.11.1.el5.src",
          "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3080"
        },
        {
          "category": "external",
          "summary": "RHBZ#539414",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539414"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3080",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3080"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3080",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3080"
        }
      ],
      "release_date": "2009-11-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-01-19T23:30:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.11.1.el5.src",
            "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.11.1.el5.src",
            "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0046"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.11.1.el5.src",
            "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.11.1.el5.src",
            "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: gdth: Prevent negative offsets in ioctl"
    },
    {
      "cve": "CVE-2009-3556",
      "cwe": {
        "id": "CWE-732",
        "name": "Incorrect Permission Assignment for Critical Resource"
      },
      "discovery_date": "2009-11-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "537177"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A certain Red Hat configuration step for the qla2xxx driver in the Linux kernel 2.6.18 on Red Hat Enterprise Linux (RHEL) 5, when N_Port ID Virtualization (NPIV) hardware is used, sets world-writable permissions for the (1) vport_create and (2) vport_delete files under /sys/class/scsi_host/, which allows local users to make arbitrary changes to SCSI host attributes by modifying these files.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: qla2xxx NPIV vport management pseudofiles are world writable",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 3, 4 and Red Hat Enterprise MRG. Shipped kernels do not include upstream commit d025c9db that introduced the problem.\n\nThis upstream commit was backported in Red Hat Enterprise Linux 5 via RHBA-2008:0314 update. Issue was addressed in Red Hat Enterprise Linux 5 via RHSA-2010:0046.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-0:2.6.18-164.11.1.el5.src",
          "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-0:2.6.18-164.11.1.el5.src",
          "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3556"
        },
        {
          "category": "external",
          "summary": "RHBZ#537177",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=537177"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3556",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3556"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3556",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3556"
        }
      ],
      "release_date": "2010-01-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-01-19T23:30:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.11.1.el5.src",
            "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.11.1.el5.src",
            "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0046"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 3.6,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.11.1.el5.src",
            "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.11.1.el5.src",
            "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: qla2xxx NPIV vport management pseudofiles are world writable"
    },
    {
      "cve": "CVE-2009-3889",
      "discovery_date": "2009-11-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "526068"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The dbg_lvl file for the megaraid_sas driver in the Linux kernel before 2.6.27 has world-writable permissions, which allows local users to change the (1) behavior and (2) logging level of the driver by modifying this file.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: megaraid_sas permissions in sysfs",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the version of the Linux kernel as shipped with Red Hat Enterprise Linux 3, as it does not implement the sysfs file system (\"/sys/\"), through which dbg_lvl file is exposed by the megaraid_sas driver.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-0:2.6.18-164.11.1.el5.src",
          "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-0:2.6.18-164.11.1.el5.src",
          "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3889"
        },
        {
          "category": "external",
          "summary": "RHBZ#526068",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=526068"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3889",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3889"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3889",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3889"
        }
      ],
      "release_date": "2009-09-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-01-19T23:30:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.11.1.el5.src",
            "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.11.1.el5.src",
            "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0046"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 3.6,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.11.1.el5.src",
            "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.11.1.el5.src",
            "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: megaraid_sas permissions in sysfs"
    },
    {
      "cve": "CVE-2009-3939",
      "discovery_date": "2009-11-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "526068"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The poll_mode_io file for the megaraid_sas driver in the Linux kernel 2.6.31.6 and earlier has world-writable permissions, which allows local users to change the I/O mode of the driver by modifying this file.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: megaraid_sas permissions in sysfs",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the version of the Linux kernel as shipped with Red Hat Enterprise Linux 3, as it does not implement the sysfs file system (\"/sys/\"), through which poll_mode_io file is exposed by the megaraid_sas driver.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-0:2.6.18-164.11.1.el5.src",
          "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-0:2.6.18-164.11.1.el5.src",
          "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3939"
        },
        {
          "category": "external",
          "summary": "RHBZ#526068",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=526068"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3939",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3939"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3939",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3939"
        }
      ],
      "release_date": "2009-09-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-01-19T23:30:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.11.1.el5.src",
            "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.11.1.el5.src",
            "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0046"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 3.6,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.11.1.el5.src",
            "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.11.1.el5.src",
            "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: megaraid_sas permissions in sysfs"
    },
    {
      "cve": "CVE-2009-4020",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2009-11-24T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "540736"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Stack-based buffer overflow in the hfs subsystem in the Linux kernel 2.6.32 allows remote attackers to have an unspecified impact via a crafted Hierarchical File System (HFS) filesystem, related to the hfs_readdir function in fs/hfs/dir.c.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: hfs buffer overflow",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the version of the Linux kernel as shipped with Red Hat Enterprise MRG as the affected driver is not enabled in this kernel.\n\nRed Hat Enterprise Linux 3 is now in Production 3 of the maintenance life-cycle, https://access.redhat.com/support/policy/updates/errata, and this issue is rated as having low impact, therefore the fix for this issue is not currently planned to be included in the future updates.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-0:2.6.18-164.11.1.el5.src",
          "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-0:2.6.18-164.11.1.el5.src",
          "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-4020"
        },
        {
          "category": "external",
          "summary": "RHBZ#540736",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=540736"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-4020",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-4020"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4020",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4020"
        }
      ],
      "release_date": "2009-12-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-01-19T23:30:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.11.1.el5.src",
            "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.11.1.el5.src",
            "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0046"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "HIGH",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.2,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.11.1.el5.src",
            "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.11.1.el5.src",
            "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: hfs buffer overflow"
    },
    {
      "cve": "CVE-2009-4021",
      "discovery_date": "2009-11-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "538734"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The fuse_direct_io function in fs/fuse/file.c in the fuse subsystem in the Linux kernel before 2.6.32-rc7 might allow attackers to cause a denial of service (invalid pointer dereference and OOPS) via vectors possibly related to a memory-consumption attack.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: fuse: prevent fuse_put_request on invalid pointer",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/CVE-2009-4021\n\nThe Linux kernel packages as shipped with Red Hat Enterprise Linux 3 and 4 do not include support for FUSE, and therefore are not affected by this issue.\n\nA future kernel update for Red Hat Enterprise MRG will address this flaw.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-0:2.6.18-164.11.1.el5.src",
          "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-0:2.6.18-164.11.1.el5.src",
          "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-4021"
        },
        {
          "category": "external",
          "summary": "RHBZ#538734",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=538734"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-4021",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-4021"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4021",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4021"
        }
      ],
      "release_date": "2009-10-22T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-01-19T23:30:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.11.1.el5.src",
            "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.11.1.el5.src",
            "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0046"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "SINGLE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.6,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.11.1.el5.src",
            "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.11.1.el5.src",
            "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: fuse: prevent fuse_put_request on invalid pointer"
    },
    {
      "cve": "CVE-2009-4138",
      "discovery_date": "2009-12-14T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "547236"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "drivers/firewire/ohci.c in the Linux kernel before 2.6.32-git9, when packet-per-buffer mode is used, allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unknown other impact via an unspecified ioctl associated with receiving an ISO packet that contains zero in the payload-length field.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: firewire: ohci: handle receive packets with a data length of zero",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/CVE-2009-4138\n\nThe Linux kernel packages as shipped with Red Hat Enterprise Linux 3 and 4 have a different (and older) implementation of the driver for OHCI 1394 controllers, which is not affected by this issue.\n\nA future kernel update for Red Hat Enterprise MRG will address this flaw.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-0:2.6.18-164.11.1.el5.src",
          "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-0:2.6.18-164.11.1.el5.src",
          "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-4138"
        },
        {
          "category": "external",
          "summary": "RHBZ#547236",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=547236"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-4138",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-4138"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4138",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4138"
        }
      ],
      "release_date": "2009-12-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-01-19T23:30:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.11.1.el5.src",
            "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.11.1.el5.src",
            "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0046"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "HIGH",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.0,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:H/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.11.1.el5.src",
            "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.11.1.el5.src",
            "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: firewire: ohci: handle receive packets with a data length of zero"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Tavis Ormandy"
          ],
          "organization": "Google Security Team"
        }
      ],
      "cve": "CVE-2009-4141",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2009-12-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "547906"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Use-after-free vulnerability in the fasync_helper function in fs/fcntl.c in the Linux kernel before 2.6.33-rc4-git1 allows local users to gain privileges via vectors that include enabling O_ASYNC (aka FASYNC or FIOASYNC) on a locked file, and then closing this file.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: create_elf_tables can leave urandom in a bad state",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 3, 4 and Red Hat Enterprise MRG. Shipped kernels do not include upstream commit 233e70f4 that introduced the problem.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-0:2.6.18-164.11.1.el5.src",
          "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-0:2.6.18-164.11.1.el5.src",
          "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-4141"
        },
        {
          "category": "external",
          "summary": "RHBZ#547906",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=547906"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-4141",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-4141"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4141",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4141"
        }
      ],
      "release_date": "2009-12-16T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-01-19T23:30:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.11.1.el5.src",
            "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.11.1.el5.src",
            "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0046"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.11.1.el5.src",
            "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.11.1.el5.src",
            "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: create_elf_tables can leave urandom in a bad state"
    },
    {
      "cve": "CVE-2009-4272",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2009-12-08T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "545411"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A certain Red Hat patch for net/ipv4/route.c in the Linux kernel 2.6.18 on Red Hat Enterprise Linux (RHEL) 5 allows remote attackers to cause a denial of service (deadlock) via crafted packets that force collisions in the IPv4 routing hash table, and trigger a routing \"emergency\" in which a hash chain is too long.  NOTE: this is related to an issue in the Linux kernel before 2.6.31, when the kernel routing cache is disabled, involving an uninitialized pointer and a panic.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: emergency route cache flushing leads to node deadlock",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 3, 4 and Red Hat Enterprise MRG. Shipped kernels do not include upstream commits c6153b5b and 1080d709 that introduced the problem.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-0:2.6.18-164.11.1.el5.src",
          "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-0:2.6.18-164.11.1.el5.src",
          "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-4272"
        },
        {
          "category": "external",
          "summary": "RHBZ#545411",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=545411"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-4272",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-4272"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4272",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4272"
        }
      ],
      "release_date": "2010-01-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-01-19T23:30:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.11.1.el5.src",
            "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.11.1.el5.src",
            "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0046"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.8,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.11.1.el5.src",
            "5Client:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.11.1.el5.src",
            "5Server:kernel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.11.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.11.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.11.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.11.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: emergency route cache flushing leads to node deadlock"
    }
  ]
}
  rhsa-2009:1671
Vulnerability from csaf_redhat
Published
2009-12-15 17:12
    Modified
2025-10-09 13:22
    Summary
Red Hat Security Advisory: kernel security and bug fix update
    Notes
Topic
Updated kernel packages that fix multiple security issues and several bugs
are now available for Red Hat Enterprise Linux 4.
This update has been rated as having important security impact by the Red
Hat Security Response Team.
    Details
The kernel packages contain the Linux kernel, the core of any Linux
operating system.
This update fixes the following security issues:
* a flaw was found in the Realtek r8169 Ethernet driver in the Linux
kernel. pci_unmap_single() presented a memory leak that could lead to IOMMU
space exhaustion and a system crash. An attacker on the local network could
trigger this flaw by using jumbo frames for large amounts of network
traffic. (CVE-2009-3613, Important)
* NULL pointer dereference flaws were found in the r128 driver in the Linux
kernel. Checks to test if the Concurrent Command Engine state was
initialized were missing in private IOCTL functions. An attacker could use
these flaws to cause a local denial of service or escalate their
privileges. (CVE-2009-3620, Important)
* an information leak was found in the Linux kernel. On AMD64 systems,
32-bit processes could access and read certain 64-bit registers by
temporarily switching themselves to 64-bit mode. (CVE-2009-2910, Moderate)
* the unix_stream_connect() function in the Linux kernel did not check if a
UNIX domain socket was in the shutdown state. This could lead to a
deadlock. A local, unprivileged user could use this flaw to cause a denial
of service. (CVE-2009-3621, Moderate)
This update also fixes the following bugs:
* an iptables rule with the recent module and a hit count value greater
than the ip_pkt_list_tot parameter (the default is 20), did not have any
effect over packets, as the hit count could not be reached. (BZ#529306)
* in environments that use dual-controller storage devices with the cciss
driver, Device-Mapper Multipath maps could not be detected and configured,
due to the cciss driver not exporting the bus attribute via sysfs. This
attribute is now exported. (BZ#529309)
* the kernel crashed with a divide error when a certain joystick was
attached. (BZ#532027)
* a bug in the mptctl_do_mpt_command() function in the mpt driver may have
resulted in crashes during boot on i386 systems with certain adapters using
the mpt driver, and also running the hugemem kernel. (BZ#533798)
* on certain hardware, the igb driver was unable to detect link statuses
correctly. This may have caused problems for network bonding, such as
failover not occurring. (BZ#534105)
* the RHSA-2009:1024 update introduced a regression. After updating to Red
Hat Enterprise Linux 4.8 and rebooting, network links often failed to be
brought up for interfaces using the forcedeth driver. "no link during
initialization" messages may have been logged. (BZ#534112)
* the RHSA-2009:1024 update introduced a second regression. On certain
systems, PS/2 keyboards failed to work. (BZ#537344)
* a bug in checksum offload calculations could have crashed the bnx2x
firmware when the iptable_nat module was loaded, causing network traffic
to stop. (BZ#537013)
* a check has been added to the IPv4 code to make sure that the routing
table data structure, rt, is not NULL, to help prevent future bugs in
functions that call ip_append_data() from being exploitable. (BZ#537016)
* possible kernel pointer dereferences on systems with several NFS mounts
(a mixture of "-o lock" and "-o nolock"), which in rare cases may have
caused a system crash, have been resolved. (BZ#537017)
Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.
    Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
    {
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated kernel packages that fix multiple security issues and several bugs\nare now available for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues:\n\n* a flaw was found in the Realtek r8169 Ethernet driver in the Linux\nkernel. pci_unmap_single() presented a memory leak that could lead to IOMMU\nspace exhaustion and a system crash. An attacker on the local network could\ntrigger this flaw by using jumbo frames for large amounts of network\ntraffic. (CVE-2009-3613, Important)\n\n* NULL pointer dereference flaws were found in the r128 driver in the Linux\nkernel. Checks to test if the Concurrent Command Engine state was\ninitialized were missing in private IOCTL functions. An attacker could use\nthese flaws to cause a local denial of service or escalate their\nprivileges. (CVE-2009-3620, Important)\n\n* an information leak was found in the Linux kernel. On AMD64 systems,\n32-bit processes could access and read certain 64-bit registers by\ntemporarily switching themselves to 64-bit mode. (CVE-2009-2910, Moderate)\n\n* the unix_stream_connect() function in the Linux kernel did not check if a\nUNIX domain socket was in the shutdown state. This could lead to a\ndeadlock. A local, unprivileged user could use this flaw to cause a denial\nof service. (CVE-2009-3621, Moderate)\n\nThis update also fixes the following bugs:\n\n* an iptables rule with the recent module and a hit count value greater\nthan the ip_pkt_list_tot parameter (the default is 20), did not have any\neffect over packets, as the hit count could not be reached. (BZ#529306)\n\n* in environments that use dual-controller storage devices with the cciss\ndriver, Device-Mapper Multipath maps could not be detected and configured,\ndue to the cciss driver not exporting the bus attribute via sysfs. This\nattribute is now exported. (BZ#529309)\n\n* the kernel crashed with a divide error when a certain joystick was\nattached. (BZ#532027)\n\n* a bug in the mptctl_do_mpt_command() function in the mpt driver may have\nresulted in crashes during boot on i386 systems with certain adapters using\nthe mpt driver, and also running the hugemem kernel. (BZ#533798)\n\n* on certain hardware, the igb driver was unable to detect link statuses\ncorrectly. This may have caused problems for network bonding, such as\nfailover not occurring. (BZ#534105)\n\n* the RHSA-2009:1024 update introduced a regression. After updating to Red\nHat Enterprise Linux 4.8 and rebooting, network links often failed to be\nbrought up for interfaces using the forcedeth driver. \"no link during\ninitialization\" messages may have been logged. (BZ#534112)\n\n* the RHSA-2009:1024 update introduced a second regression. On certain\nsystems, PS/2 keyboards failed to work. (BZ#537344)\n\n* a bug in checksum offload calculations could have crashed the bnx2x\nfirmware when the iptable_nat module was loaded, causing network traffic\nto stop. (BZ#537013)\n\n* a check has been added to the IPv4 code to make sure that the routing\ntable data structure, rt, is not NULL, to help prevent future bugs in\nfunctions that call ip_append_data() from being exploitable. (BZ#537016)\n\n* possible kernel pointer dereferences on systems with several NFS mounts\n(a mixture of \"-o lock\" and \"-o nolock\"), which in rare cases may have\ncaused a system crash, have been resolved. (BZ#537017)\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2009:1671",
        "url": "https://access.redhat.com/errata/RHSA-2009:1671"
      },
      {
        "category": "external",
        "summary": "532027",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=532027"
      },
      {
        "category": "external",
        "summary": "533798",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533798"
      },
      {
        "category": "external",
        "summary": "534105",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=534105"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "526788",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=526788"
      },
      {
        "category": "external",
        "summary": "529137",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529137"
      },
      {
        "category": "external",
        "summary": "529306",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529306"
      },
      {
        "category": "external",
        "summary": "529309",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529309"
      },
      {
        "category": "external",
        "summary": "529597",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529597"
      },
      {
        "category": "external",
        "summary": "529626",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529626"
      },
      {
        "category": "external",
        "summary": "534112",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=534112"
      },
      {
        "category": "external",
        "summary": "537013",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=537013"
      },
      {
        "category": "external",
        "summary": "537016",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=537016"
      },
      {
        "category": "external",
        "summary": "537017",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=537017"
      },
      {
        "category": "external",
        "summary": "537344",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=537344"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1671.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security and bug fix update",
    "tracking": {
      "current_release_date": "2025-10-09T13:22:13+00:00",
      "generator": {
        "date": "2025-10-09T13:22:13+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2009:1671",
      "initial_release_date": "2009-12-15T17:12:00+00:00",
      "revision_history": [
        {
          "date": "2009-12-15T17:12:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2009-12-15T12:18:22+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T13:22:13+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AS version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux AS version 4",
                  "product_id": "4AS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::as"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Desktop version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux Desktop version 4",
                  "product_id": "4Desktop",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux ES version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux ES version 4",
                  "product_id": "4ES",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::es"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux WS version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux WS version 4",
                  "product_id": "4WS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
                  "product_id": "kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.18.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
                "product": {
                  "name": "kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
                  "product_id": "kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-hugemem@2.6.9-89.0.18.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-89.0.18.EL.i686",
                "product": {
                  "name": "kernel-devel-0:2.6.9-89.0.18.EL.i686",
                  "product_id": "kernel-devel-0:2.6.9-89.0.18.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.18.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
                "product": {
                  "name": "kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
                  "product_id": "kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-89.0.18.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
                "product": {
                  "name": "kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
                  "product_id": "kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-hugemem-devel@2.6.9-89.0.18.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
                "product": {
                  "name": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
                  "product_id": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xenU-devel@2.6.9-89.0.18.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-89.0.18.EL.i686",
                "product": {
                  "name": "kernel-0:2.6.9-89.0.18.EL.i686",
                  "product_id": "kernel-0:2.6.9-89.0.18.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.18.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-smp-0:2.6.9-89.0.18.EL.i686",
                "product": {
                  "name": "kernel-smp-0:2.6.9-89.0.18.EL.i686",
                  "product_id": "kernel-smp-0:2.6.9-89.0.18.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-smp@2.6.9-89.0.18.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xenU-0:2.6.9-89.0.18.EL.i686",
                "product": {
                  "name": "kernel-xenU-0:2.6.9-89.0.18.EL.i686",
                  "product_id": "kernel-xenU-0:2.6.9-89.0.18.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xenU@2.6.9-89.0.18.EL?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
                  "product_id": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.18.EL?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
                "product": {
                  "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
                  "product_id": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-89.0.18.EL?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-89.0.18.EL.ia64",
                "product": {
                  "name": "kernel-devel-0:2.6.9-89.0.18.EL.ia64",
                  "product_id": "kernel-devel-0:2.6.9-89.0.18.EL.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.18.EL?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-89.0.18.EL.ia64",
                "product": {
                  "name": "kernel-0:2.6.9-89.0.18.EL.ia64",
                  "product_id": "kernel-0:2.6.9-89.0.18.EL.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.18.EL?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
                "product": {
                  "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
                  "product_id": "kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-89.0.18.EL?arch=ia64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ia64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
                  "product_id": "kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.18.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
                "product": {
                  "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
                  "product_id": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-89.0.18.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
                "product": {
                  "name": "kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
                  "product_id": "kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.18.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
                "product": {
                  "name": "kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
                  "product_id": "kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-89.0.18.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
                "product": {
                  "name": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
                  "product_id": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xenU-devel@2.6.9-89.0.18.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-89.0.18.EL.x86_64",
                "product": {
                  "name": "kernel-0:2.6.9-89.0.18.EL.x86_64",
                  "product_id": "kernel-0:2.6.9-89.0.18.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.18.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
                "product": {
                  "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
                  "product_id": "kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-89.0.18.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
                "product": {
                  "name": "kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
                  "product_id": "kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-smp@2.6.9-89.0.18.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
                "product": {
                  "name": "kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
                  "product_id": "kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xenU@2.6.9-89.0.18.EL?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-89.0.18.EL.src",
                "product": {
                  "name": "kernel-0:2.6.9-89.0.18.EL.src",
                  "product_id": "kernel-0:2.6.9-89.0.18.EL.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.18.EL?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-doc-0:2.6.9-89.0.18.EL.noarch",
                "product": {
                  "name": "kernel-doc-0:2.6.9-89.0.18.EL.noarch",
                  "product_id": "kernel-doc-0:2.6.9-89.0.18.EL.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@2.6.9-89.0.18.EL?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
                  "product_id": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.18.EL?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
                "product": {
                  "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
                  "product_id": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-89.0.18.EL?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
                "product": {
                  "name": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
                  "product_id": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.18.EL?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-89.0.18.EL.ppc64",
                "product": {
                  "name": "kernel-0:2.6.9-89.0.18.EL.ppc64",
                  "product_id": "kernel-0:2.6.9-89.0.18.EL.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.18.EL?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
                "product": {
                  "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
                  "product_id": "kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-89.0.18.EL?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
                  "product_id": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.18.EL?arch=ppc64iseries"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
                "product": {
                  "name": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
                  "product_id": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.18.EL?arch=ppc64iseries"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
                "product": {
                  "name": "kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
                  "product_id": "kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.18.EL?arch=ppc64iseries"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64iseries"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
                  "product_id": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.18.EL?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-89.0.18.EL.s390x",
                "product": {
                  "name": "kernel-devel-0:2.6.9-89.0.18.EL.s390x",
                  "product_id": "kernel-devel-0:2.6.9-89.0.18.EL.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.18.EL?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-89.0.18.EL.s390x",
                "product": {
                  "name": "kernel-0:2.6.9-89.0.18.EL.s390x",
                  "product_id": "kernel-0:2.6.9-89.0.18.EL.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.18.EL?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
                  "product_id": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.18.EL?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-89.0.18.EL.s390",
                "product": {
                  "name": "kernel-devel-0:2.6.9-89.0.18.EL.s390",
                  "product_id": "kernel-devel-0:2.6.9-89.0.18.EL.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.18.EL?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-89.0.18.EL.s390",
                "product": {
                  "name": "kernel-0:2.6.9-89.0.18.EL.s390",
                  "product_id": "kernel-0:2.6.9-89.0.18.EL.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.18.EL?arch=s390"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.s390 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-89.0.18.EL.s390"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.s390",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.s390x as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-89.0.18.EL.s390x"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.s390x",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.src as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-89.0.18.EL.src"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.src",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.s390 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.s390",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.s390x as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.s390x",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.9-89.0.18.EL.noarch as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-doc-0:2.6.9-89.0.18.EL.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.9-89.0.18.EL.noarch",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-smp-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-smp-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-xenU-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64iseries"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.s390",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390x"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.s390x",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.src as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-89.0.18.EL.src"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.src",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.s390",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.s390x",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.9-89.0.18.EL.noarch as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-doc-0:2.6.9-89.0.18.EL.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.9-89.0.18.EL.noarch",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-hugemem-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-smp-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-xenU-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64iseries"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.s390 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-89.0.18.EL.s390"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.s390",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.s390x as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-89.0.18.EL.s390x"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.s390x",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.src as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-89.0.18.EL.src"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.src",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.s390 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.s390",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.s390x as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.s390x",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.9-89.0.18.EL.noarch as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-doc-0:2.6.9-89.0.18.EL.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.9-89.0.18.EL.noarch",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-hugemem-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-smp-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-smp-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-smp-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-xenU-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.s390 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-89.0.18.EL.s390"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.s390",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.s390x as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-89.0.18.EL.s390x"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.s390x",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.src as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-89.0.18.EL.src"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.src",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.s390 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.s390",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.s390x as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.s390x",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.9-89.0.18.EL.noarch as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-doc-0:2.6.9-89.0.18.EL.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.9-89.0.18.EL.noarch",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-smp-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-smp-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-xenU-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4WS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2009-2910",
      "discovery_date": "2009-10-01T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "526788"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "arch/x86/ia32/ia32entry.S in the Linux kernel before 2.6.31.4 on the x86_64 platform does not clear certain kernel registers before a return to user mode, which allows local users to read register values from an earlier process by switching an ia32 process to 64-bit mode.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: x86_64 32 bit process register leak",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is not planned to be fixed in Red Hat Enterprise Linux 3, due to this product being in Production 3 of its maintenance life-cycle, where only qualified security errata of important and critical impact are addressed.\n\nFor further information about Errata Support Policy, visit: https://access.redhat.com/support/policy/updates/errata/",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:kernel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4AS:kernel-0:2.6.9-89.0.18.EL.s390",
          "4AS:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4AS:kernel-0:2.6.9-89.0.18.EL.src",
          "4AS:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4AS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.src",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4Desktop:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4ES:kernel-0:2.6.9-89.0.18.EL.s390",
          "4ES:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4ES:kernel-0:2.6.9-89.0.18.EL.src",
          "4ES:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4ES:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4WS:kernel-0:2.6.9-89.0.18.EL.s390",
          "4WS:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4WS:kernel-0:2.6.9-89.0.18.EL.src",
          "4WS:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4WS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-2910"
        },
        {
          "category": "external",
          "summary": "RHBZ#526788",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=526788"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2910",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-2910"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2910",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2910"
        }
      ],
      "release_date": "2009-10-01T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-12-15T17:12:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-0:2.6.9-89.0.18.EL.src",
            "4AS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.src",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-0:2.6.9-89.0.18.EL.src",
            "4ES:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-0:2.6.9-89.0.18.EL.src",
            "4WS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1671"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "products": [
            "4AS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-0:2.6.9-89.0.18.EL.src",
            "4AS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.src",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-0:2.6.9-89.0.18.EL.src",
            "4ES:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-0:2.6.9-89.0.18.EL.src",
            "4WS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: x86_64 32 bit process register leak"
    },
    {
      "cve": "CVE-2009-3613",
      "discovery_date": "2009-10-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "529137"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The swiotlb functionality in the r8169 driver in drivers/net/r8169.c in the Linux kernel before 2.6.27.22 allows remote attackers to cause a denial of service (IOMMU space exhaustion and system crash) by using jumbo frames for a large amount of network traffic, as demonstrated by a flood ping.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: flood ping cause out-of-iommu error and panic when mtu larger than 1500",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:kernel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4AS:kernel-0:2.6.9-89.0.18.EL.s390",
          "4AS:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4AS:kernel-0:2.6.9-89.0.18.EL.src",
          "4AS:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4AS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.src",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4Desktop:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4ES:kernel-0:2.6.9-89.0.18.EL.s390",
          "4ES:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4ES:kernel-0:2.6.9-89.0.18.EL.src",
          "4ES:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4ES:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4WS:kernel-0:2.6.9-89.0.18.EL.s390",
          "4WS:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4WS:kernel-0:2.6.9-89.0.18.EL.src",
          "4WS:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4WS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3613"
        },
        {
          "category": "external",
          "summary": "RHBZ#529137",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529137"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3613",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3613"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3613",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3613"
        }
      ],
      "release_date": "2007-11-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-12-15T17:12:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-0:2.6.9-89.0.18.EL.src",
            "4AS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.src",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-0:2.6.9-89.0.18.EL.src",
            "4ES:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-0:2.6.9-89.0.18.EL.src",
            "4WS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1671"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "4AS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-0:2.6.9-89.0.18.EL.src",
            "4AS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.src",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-0:2.6.9-89.0.18.EL.src",
            "4ES:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-0:2.6.9-89.0.18.EL.src",
            "4WS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: flood ping cause out-of-iommu error and panic when mtu larger than 1500"
    },
    {
      "cve": "CVE-2009-3620",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2009-10-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "529597"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The ATI Rage 128 (aka r128) driver in the Linux kernel before 2.6.31-git11 does not properly verify Concurrent Command Engine (CCE) state initialization, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly gain privileges via unspecified ioctl calls.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: r128 IOCTL NULL pointer dereferences when CCE state is uninitialised",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:kernel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4AS:kernel-0:2.6.9-89.0.18.EL.s390",
          "4AS:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4AS:kernel-0:2.6.9-89.0.18.EL.src",
          "4AS:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4AS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.src",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4Desktop:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4ES:kernel-0:2.6.9-89.0.18.EL.s390",
          "4ES:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4ES:kernel-0:2.6.9-89.0.18.EL.src",
          "4ES:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4ES:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4WS:kernel-0:2.6.9-89.0.18.EL.s390",
          "4WS:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4WS:kernel-0:2.6.9-89.0.18.EL.src",
          "4WS:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4WS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3620"
        },
        {
          "category": "external",
          "summary": "RHBZ#529597",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529597"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3620",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3620"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3620",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3620"
        }
      ],
      "release_date": "2009-08-30T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-12-15T17:12:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-0:2.6.9-89.0.18.EL.src",
            "4AS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.src",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-0:2.6.9-89.0.18.EL.src",
            "4ES:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-0:2.6.9-89.0.18.EL.src",
            "4WS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1671"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.9,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "4AS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-0:2.6.9-89.0.18.EL.src",
            "4AS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.src",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-0:2.6.9-89.0.18.EL.src",
            "4ES:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-0:2.6.9-89.0.18.EL.src",
            "4WS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: r128 IOCTL NULL pointer dereferences when CCE state is uninitialised"
    },
    {
      "cve": "CVE-2009-3621",
      "discovery_date": "2009-10-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "529626"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "net/unix/af_unix.c in the Linux kernel 2.6.31.4 and earlier allows local users to cause a denial of service (system hang) by creating an abstract-namespace AF_UNIX listening socket, performing a shutdown operation on this socket, and then performing a series of connect operations to this socket.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: AF_UNIX: Fix deadlock on connecting to shutdown socket",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is not planned to be fixed in Red Hat Enterprise Linux 3, due to this product being in Production 3 of its maintenance life-cycle, where only qualified security errata of important or critical impact are addressed.\n\nFor further information about Errata Support Policy, visit: https://access.redhat.com/support/policy/updates/errata/",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:kernel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4AS:kernel-0:2.6.9-89.0.18.EL.s390",
          "4AS:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4AS:kernel-0:2.6.9-89.0.18.EL.src",
          "4AS:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4AS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.src",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4Desktop:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4ES:kernel-0:2.6.9-89.0.18.EL.s390",
          "4ES:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4ES:kernel-0:2.6.9-89.0.18.EL.src",
          "4ES:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4ES:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4WS:kernel-0:2.6.9-89.0.18.EL.s390",
          "4WS:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4WS:kernel-0:2.6.9-89.0.18.EL.src",
          "4WS:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4WS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3621"
        },
        {
          "category": "external",
          "summary": "RHBZ#529626",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529626"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3621",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3621"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3621",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3621"
        }
      ],
      "release_date": "2009-10-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-12-15T17:12:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-0:2.6.9-89.0.18.EL.src",
            "4AS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.src",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-0:2.6.9-89.0.18.EL.src",
            "4ES:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-0:2.6.9-89.0.18.EL.src",
            "4WS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1671"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.9,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "4AS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-0:2.6.9-89.0.18.EL.src",
            "4AS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.src",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-0:2.6.9-89.0.18.EL.src",
            "4ES:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-0:2.6.9-89.0.18.EL.src",
            "4WS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: AF_UNIX: Fix deadlock on connecting to shutdown socket"
    }
  ]
}
  fkie_cve-2009-2910
Vulnerability from fkie_nvd
Published
2009-10-20 17:30
    Modified
2025-04-09 00:30
    
          Severity ?
        
        Summary
arch/x86/ia32/ia32entry.S in the Linux kernel before 2.6.31.4 on the x86_64 platform does not clear certain kernel registers before a return to user mode, which allows local users to read register values from an earlier process by switching an ia32 process to 64-bit mode.
    References
      | URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | http://git.kernel.org/?p=linux/kernel/git/x86/linux-2.6-tip.git%3Ba=commit%3Bh=24e35800cdc4350fc34e2bed37b608a9e13ab3b6 | ||
| secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00005.html | Mailing List, Third Party Advisory | |
| secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00007.html | Mailing List, Third Party Advisory | |
| secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html | Mailing List, Third Party Advisory | |
| secalert@redhat.com | http://lkml.org/lkml/2009/10/1/164 | Patch, Third Party Advisory | |
| secalert@redhat.com | http://marc.info/?l=oss-security&m=125442304214452&w=2 | Third Party Advisory | |
| secalert@redhat.com | http://marc.info/?l=oss-security&m=125444390112831&w=2 | Third Party Advisory | |
| secalert@redhat.com | http://marc.info/?l=oss-security&m=125511635004768&w=2 | Third Party Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/36927 | Third Party Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/37075 | Third Party Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/37351 | Third Party Advisory | |
| secalert@redhat.com | http://support.avaya.com/css/P8/documents/100073666 | Third Party Advisory | |
| secalert@redhat.com | http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.31.4 | Broken Link | |
| secalert@redhat.com | http://www.openwall.com/lists/oss-security/2009/10/02/1 | Mailing List, Third Party Advisory | |
| secalert@redhat.com | http://www.redhat.com/support/errata/RHSA-2009-1671.html | Third Party Advisory | |
| secalert@redhat.com | http://www.securityfocus.com/bid/36576 | Third Party Advisory, VDB Entry | |
| secalert@redhat.com | http://www.ubuntu.com/usn/usn-864-1 | Third Party Advisory | |
| secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=526788 | Issue Tracking, Patch, Third Party Advisory | |
| secalert@redhat.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10823 | Third Party Advisory | |
| secalert@redhat.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7359 | Third Party Advisory | |
| secalert@redhat.com | https://rhn.redhat.com/errata/RHSA-2009-1540.html | Third Party Advisory | |
| secalert@redhat.com | https://rhn.redhat.com/errata/RHSA-2010-0046.html | Third Party Advisory | |
| secalert@redhat.com | https://rhn.redhat.com/errata/RHSA-2010-0095.html | Third Party Advisory | |
| secalert@redhat.com | https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00483.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://git.kernel.org/?p=linux/kernel/git/x86/linux-2.6-tip.git%3Ba=commit%3Bh=24e35800cdc4350fc34e2bed37b608a9e13ab3b6 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00005.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00007.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lkml.org/lkml/2009/10/1/164 | Patch, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=oss-security&m=125442304214452&w=2 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=oss-security&m=125444390112831&w=2 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=oss-security&m=125511635004768&w=2 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/36927 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/37075 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/37351 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://support.avaya.com/css/P8/documents/100073666 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.31.4 | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2009/10/02/1 | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2009-1671.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/36576 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/usn-864-1 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=526788 | Issue Tracking, Patch, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10823 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7359 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://rhn.redhat.com/errata/RHSA-2009-1540.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://rhn.redhat.com/errata/RHSA-2010-0046.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://rhn.redhat.com/errata/RHSA-2010-0095.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00483.html | Third Party Advisory | 
Impacted products
      | Vendor | Product | Version | |
|---|---|---|---|
| linux | linux_kernel | * | |
| suse | linux_enterprise_debuginfo | 10 | |
| opensuse | opensuse | 11.0 | |
| suse | linux_enterprise_desktop | 10 | |
| suse | linux_enterprise_server | 9 | |
| suse | linux_enterprise_server | 10 | |
| suse | linux_enterprise_software_development_kit | 10 | |
| canonical | ubuntu_linux | 6.06 | |
| canonical | ubuntu_linux | 8.04 | |
| canonical | ubuntu_linux | 8.10 | |
| canonical | ubuntu_linux | 9.04 | |
| canonical | ubuntu_linux | 9.10 | |
| redhat | virtualization | 5 | |
| redhat | enterprise_linux_desktop | 5.0 | |
| redhat | enterprise_linux_eus | 5.4 | |
| redhat | enterprise_linux_server | 5.0 | |
| redhat | enterprise_linux_workstation | 5.0 | |
| fedoraproject | fedora | 10 | 
{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF8153BE-F192-4143-B977-4424F9E592D9",
              "versionEndExcluding": "2.6.31.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:suse:linux_enterprise_debuginfo:10:sp2:*:*:*:*:*:*",
              "matchCriteriaId": "3E135846-8959-4D7E-A8E6-07F0EC15F010",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B42AB65-443B-4655-BAEA-4EB4A43D9509",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:10:sp2:*:*:*:*:*:*",
              "matchCriteriaId": "513797E6-FCE6-4E84-9B66-202541F9601E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CD2D897-E321-4CED-92E0-11A98B52053C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:suse:linux_enterprise_server:10:sp2:*:*:*:*:*:*",
              "matchCriteriaId": "22A79A35-05DB-4B9F-AD3E-EA6F933CF10C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp2:*:*:*:*:*:*",
              "matchCriteriaId": "D3BEE9CB-F0AF-44B1-B454-1AE2F04D7299",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
              "matchCriteriaId": "454A5D17-B171-4F1F-9E0B-F18D1E5CA9FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*",
              "matchCriteriaId": "7EBFE35C-E243-43D1-883D-4398D71763CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "4747CC68-FAF4-482F-929A-9DA6C24CB663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5D026D0-EF78-438D-BEDD-FC8571F3ACEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2BCB73E-27BB-4878-AD9C-90C4F20C25A0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:redhat:virtualization:5:*:*:*:*:*:*:*",
              "matchCriteriaId": "C029C71B-EB6F-4A45-B138-FE140E100B2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "133AAFA7-AF42-4D7B-8822-AA2E85611BF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DD6917D-FE03-487F-9F2C-A79B5FCFBC5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "54D669D4-6D7E-449D-80C1-28FA44F06FFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0AC5CD5-6E58-433C-9EB3-6DFE5656463E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*",
              "matchCriteriaId": "7000D33B-F3C7-43E8-8FC7-9B97AADC3E12",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "arch/x86/ia32/ia32entry.S in the Linux kernel before 2.6.31.4 on the x86_64 platform does not clear certain kernel registers before a return to user mode, which allows local users to read register values from an earlier process by switching an ia32 process to 64-bit mode."
    },
    {
      "lang": "es",
      "value": "arch/x86/ia32/ia32entry.S en el kernel de Linux anteriores a v2.6.31.4 en plataformas x86_64 no limpia adecuadamente ciertos registros del kernel antes de regresar al modo usuario, lo que permite a usuarios locales leer valores del registro desde un proceso anterior mediante el cambio de un proceso ia32 al modo 64-bit"
    }
  ],
  "id": "CVE-2009-2910",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-10-20T17:30:00.907",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://git.kernel.org/?p=linux/kernel/git/x86/linux-2.6-tip.git%3Ba=commit%3Bh=24e35800cdc4350fc34e2bed37b608a9e13ab3b6"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00005.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00007.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "http://lkml.org/lkml/2009/10/1/164"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://marc.info/?l=oss-security\u0026m=125442304214452\u0026w=2"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://marc.info/?l=oss-security\u0026m=125444390112831\u0026w=2"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://marc.info/?l=oss-security\u0026m=125511635004768\u0026w=2"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/36927"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/37075"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/37351"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://support.avaya.com/css/P8/documents/100073666"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.31.4"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2009/10/02/1"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2009-1671.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/36576"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/usn-864-1"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=526788"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10823"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7359"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://rhn.redhat.com/errata/RHSA-2009-1540.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://rhn.redhat.com/errata/RHSA-2010-0046.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://rhn.redhat.com/errata/RHSA-2010-0095.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00483.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.kernel.org/?p=linux/kernel/git/x86/linux-2.6-tip.git%3Ba=commit%3Bh=24e35800cdc4350fc34e2bed37b608a9e13ab3b6"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00005.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00007.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "http://lkml.org/lkml/2009/10/1/164"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://marc.info/?l=oss-security\u0026m=125442304214452\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://marc.info/?l=oss-security\u0026m=125444390112831\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://marc.info/?l=oss-security\u0026m=125511635004768\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/36927"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/37075"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/37351"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://support.avaya.com/css/P8/documents/100073666"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.31.4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2009/10/02/1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2009-1671.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/36576"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/usn-864-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=526788"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10823"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7359"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://rhn.redhat.com/errata/RHSA-2009-1540.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://rhn.redhat.com/errata/RHSA-2010-0046.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://rhn.redhat.com/errata/RHSA-2010-0095.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00483.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vendorComments": [
    {
      "comment": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/CVE-2009-2910\n\nIt has been rated as having moderate security impact.\n\nIt was addressed in Red Hat Enterprise Linux 4, 5 and Red Hat Enterprise MRG via: https://rhn.redhat.com/errata/RHSA-2009-1671.html , https://rhn.redhat.com/errata/RHSA-2010-0046.html and https://rhn.redhat.com/errata/RHSA-2009-1540.html respectively.\n\nThis issue is not planned to be fixed in Red Hat Enterprise Linux 3, due to this product being in Production 3 of its maintenance life-cycle, where only qualified security errata of important and critical impact are addressed.\n\nFor further information about Errata Support Policy, visit: http://www.redhat.com/security/updates/errata/",
      "lastModified": "2010-01-21T00:00:00",
      "organization": "Red Hat"
    }
  ],
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}
  gsd-2009-2910
Vulnerability from gsd
Modified
2023-12-13 01:19
      Details
        
          arch/x86/ia32/ia32entry.S in the Linux kernel before 2.6.31.4 on the x86_64 platform does not clear certain kernel registers before a return to user mode, which allows local users to read register values from an earlier process by switching an ia32 process to 64-bit mode.
        
      Aliases
        
      Aliases
        
      {
  "GSD": {
    "alias": "CVE-2009-2910",
    "description": "arch/x86/ia32/ia32entry.S in the Linux kernel before 2.6.31.4 on the x86_64 platform does not clear certain kernel registers before a return to user mode, which allows local users to read register values from an earlier process by switching an ia32 process to 64-bit mode.",
    "id": "GSD-2009-2910",
    "references": [
      "https://www.suse.com/security/cve/CVE-2009-2910.html",
      "https://www.debian.org/security/2009/dsa-1928",
      "https://www.debian.org/security/2009/dsa-1915",
      "https://access.redhat.com/errata/RHSA-2010:0046",
      "https://access.redhat.com/errata/RHSA-2009:1671",
      "https://access.redhat.com/errata/RHSA-2009:1540",
      "https://linux.oracle.com/cve/CVE-2009-2910.html"
    ]
  },
  "gsd": {
    "metadata": {
      "exploitCode": "unknown",
      "remediation": "unknown",
      "reportConfidence": "confirmed",
      "type": "vulnerability"
    },
    "osvSchema": {
      "aliases": [
        "CVE-2009-2910"
      ],
      "details": "arch/x86/ia32/ia32entry.S in the Linux kernel before 2.6.31.4 on the x86_64 platform does not clear certain kernel registers before a return to user mode, which allows local users to read register values from an earlier process by switching an ia32 process to 64-bit mode.",
      "id": "GSD-2009-2910",
      "modified": "2023-12-13T01:19:46.651298Z",
      "schema_version": "1.4.0"
    }
  },
  "namespaces": {
    "cve.org": {
      "CVE_data_meta": {
        "ASSIGNER": "secalert@redhat.com",
        "ID": "CVE-2009-2910",
        "STATE": "PUBLIC"
      },
      "affects": {
        "vendor": {
          "vendor_data": [
            {
              "product": {
                "product_data": [
                  {
                    "product_name": "n/a",
                    "version": {
                      "version_data": [
                        {
                          "version_affected": "=",
                          "version_value": "n/a"
                        }
                      ]
                    }
                  }
                ]
              },
              "vendor_name": "n/a"
            }
          ]
        }
      },
      "data_format": "MITRE",
      "data_type": "CVE",
      "data_version": "4.0",
      "description": {
        "description_data": [
          {
            "lang": "eng",
            "value": "arch/x86/ia32/ia32entry.S in the Linux kernel before 2.6.31.4 on the x86_64 platform does not clear certain kernel registers before a return to user mode, which allows local users to read register values from an earlier process by switching an ia32 process to 64-bit mode."
          }
        ]
      },
      "problemtype": {
        "problemtype_data": [
          {
            "description": [
              {
                "lang": "eng",
                "value": "n/a"
              }
            ]
          }
        ]
      },
      "references": {
        "reference_data": [
          {
            "name": "http://support.avaya.com/css/P8/documents/100073666",
            "refsource": "MISC",
            "url": "http://support.avaya.com/css/P8/documents/100073666"
          },
          {
            "name": "http://www.ubuntu.com/usn/usn-864-1",
            "refsource": "MISC",
            "url": "http://www.ubuntu.com/usn/usn-864-1"
          },
          {
            "name": "https://rhn.redhat.com/errata/RHSA-2010-0046.html",
            "refsource": "MISC",
            "url": "https://rhn.redhat.com/errata/RHSA-2010-0046.html"
          },
          {
            "name": "https://rhn.redhat.com/errata/RHSA-2010-0095.html",
            "refsource": "MISC",
            "url": "https://rhn.redhat.com/errata/RHSA-2010-0095.html"
          },
          {
            "name": "http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html",
            "refsource": "MISC",
            "url": "http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html"
          },
          {
            "name": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00005.html",
            "refsource": "MISC",
            "url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00005.html"
          },
          {
            "name": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00007.html",
            "refsource": "MISC",
            "url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00007.html"
          },
          {
            "name": "http://secunia.com/advisories/37351",
            "refsource": "MISC",
            "url": "http://secunia.com/advisories/37351"
          },
          {
            "name": "https://rhn.redhat.com/errata/RHSA-2009-1540.html",
            "refsource": "MISC",
            "url": "https://rhn.redhat.com/errata/RHSA-2009-1540.html"
          },
          {
            "name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.31.4",
            "refsource": "MISC",
            "url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.31.4"
          },
          {
            "name": "http://secunia.com/advisories/37075",
            "refsource": "MISC",
            "url": "http://secunia.com/advisories/37075"
          },
          {
            "name": "https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00483.html",
            "refsource": "MISC",
            "url": "https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00483.html"
          },
          {
            "name": "http://git.kernel.org/?p=linux/kernel/git/x86/linux-2.6-tip.git%3Ba=commit%3Bh=24e35800cdc4350fc34e2bed37b608a9e13ab3b6",
            "refsource": "MISC",
            "url": "http://git.kernel.org/?p=linux/kernel/git/x86/linux-2.6-tip.git%3Ba=commit%3Bh=24e35800cdc4350fc34e2bed37b608a9e13ab3b6"
          },
          {
            "name": "http://lkml.org/lkml/2009/10/1/164",
            "refsource": "MISC",
            "url": "http://lkml.org/lkml/2009/10/1/164"
          },
          {
            "name": "http://marc.info/?l=oss-security\u0026m=125442304214452\u0026w=2",
            "refsource": "MISC",
            "url": "http://marc.info/?l=oss-security\u0026m=125442304214452\u0026w=2"
          },
          {
            "name": "http://marc.info/?l=oss-security\u0026m=125444390112831\u0026w=2",
            "refsource": "MISC",
            "url": "http://marc.info/?l=oss-security\u0026m=125444390112831\u0026w=2"
          },
          {
            "name": "http://marc.info/?l=oss-security\u0026m=125511635004768\u0026w=2",
            "refsource": "MISC",
            "url": "http://marc.info/?l=oss-security\u0026m=125511635004768\u0026w=2"
          },
          {
            "name": "http://secunia.com/advisories/36927",
            "refsource": "MISC",
            "url": "http://secunia.com/advisories/36927"
          },
          {
            "name": "http://www.openwall.com/lists/oss-security/2009/10/02/1",
            "refsource": "MISC",
            "url": "http://www.openwall.com/lists/oss-security/2009/10/02/1"
          },
          {
            "name": "http://www.redhat.com/support/errata/RHSA-2009-1671.html",
            "refsource": "MISC",
            "url": "http://www.redhat.com/support/errata/RHSA-2009-1671.html"
          },
          {
            "name": "http://www.securityfocus.com/bid/36576",
            "refsource": "MISC",
            "url": "http://www.securityfocus.com/bid/36576"
          },
          {
            "name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10823",
            "refsource": "MISC",
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10823"
          },
          {
            "name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7359",
            "refsource": "MISC",
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7359"
          },
          {
            "name": "https://bugzilla.redhat.com/show_bug.cgi?id=526788",
            "refsource": "MISC",
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=526788"
          }
        ]
      }
    },
    "nvd.nist.gov": {
      "configurations": {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndExcluding": "2.6.31.4",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_server:10:sp2:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_desktop:10:sp2:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp2:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:suse:linux_enterprise_debuginfo:10:sp2:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:virtualization:5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:5.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      },
      "cve": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2009-2910"
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "en",
              "value": "arch/x86/ia32/ia32entry.S in the Linux kernel before 2.6.31.4 on the x86_64 platform does not clear certain kernel registers before a return to user mode, which allows local users to read register values from an earlier process by switching an ia32 process to 64-bit mode."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "en",
                  "value": "CWE-200"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "36927",
              "refsource": "SECUNIA",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "http://secunia.com/advisories/36927"
            },
            {
              "name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.31.4",
              "refsource": "CONFIRM",
              "tags": [
                "Broken Link"
              ],
              "url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.31.4"
            },
            {
              "name": "FEDORA-2009-10525",
              "refsource": "FEDORA",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00483.html"
            },
            {
              "name": "[oss-security] 20091002 Re: CVE Request (kernel)",
              "refsource": "MLIST",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "http://marc.info/?l=oss-security\u0026m=125444390112831\u0026w=2"
            },
            {
              "name": "[oss-security] 20091001 CVE Request (kernel)",
              "refsource": "MLIST",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "http://marc.info/?l=oss-security\u0026m=125442304214452\u0026w=2"
            },
            {
              "name": "37075",
              "refsource": "SECUNIA",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "http://secunia.com/advisories/37075"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=526788",
              "refsource": "CONFIRM",
              "tags": [
                "Issue Tracking",
                "Patch",
                "Third Party Advisory"
              ],
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=526788"
            },
            {
              "name": "[linux-kernel] 20091001 [tip:x86/urgent] x86: Don\u0027t leak 64-bit kernel register values to 32-bit processes",
              "refsource": "MLIST",
              "tags": [
                "Patch",
                "Third Party Advisory"
              ],
              "url": "http://lkml.org/lkml/2009/10/1/164"
            },
            {
              "name": "[oss-security] 20091009 Re: CVE Request (kernel)",
              "refsource": "MLIST",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "http://marc.info/?l=oss-security\u0026m=125511635004768\u0026w=2"
            },
            {
              "name": "36576",
              "refsource": "BID",
              "tags": [
                "Third Party Advisory",
                "VDB Entry"
              ],
              "url": "http://www.securityfocus.com/bid/36576"
            },
            {
              "name": "RHSA-2009:1540",
              "refsource": "REDHAT",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://rhn.redhat.com/errata/RHSA-2009-1540.html"
            },
            {
              "name": "[oss-security] 20091001 Re: CVE Request (kernel)",
              "refsource": "MLIST",
              "tags": [
                "Mailing List",
                "Third Party Advisory"
              ],
              "url": "http://www.openwall.com/lists/oss-security/2009/10/02/1"
            },
            {
              "name": "SUSE-SA:2009:056",
              "refsource": "SUSE",
              "tags": [
                "Mailing List",
                "Third Party Advisory"
              ],
              "url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00007.html"
            },
            {
              "name": "SUSE-SA:2009:054",
              "refsource": "SUSE",
              "tags": [
                "Mailing List",
                "Third Party Advisory"
              ],
              "url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00005.html"
            },
            {
              "name": "37351",
              "refsource": "SECUNIA",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "http://secunia.com/advisories/37351"
            },
            {
              "name": "RHSA-2009:1671",
              "refsource": "REDHAT",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "http://www.redhat.com/support/errata/RHSA-2009-1671.html"
            },
            {
              "name": "RHSA-2010:0046",
              "refsource": "REDHAT",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://rhn.redhat.com/errata/RHSA-2010-0046.html"
            },
            {
              "name": "RHSA-2010:0095",
              "refsource": "REDHAT",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://rhn.redhat.com/errata/RHSA-2010-0095.html"
            },
            {
              "name": "http://support.avaya.com/css/P8/documents/100073666",
              "refsource": "CONFIRM",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "http://support.avaya.com/css/P8/documents/100073666"
            },
            {
              "name": "SUSE-SA:2010:012",
              "refsource": "SUSE",
              "tags": [
                "Mailing List",
                "Third Party Advisory"
              ],
              "url": "http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html"
            },
            {
              "name": "USN-864-1",
              "refsource": "UBUNTU",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "http://www.ubuntu.com/usn/usn-864-1"
            },
            {
              "name": "oval:org.mitre.oval:def:7359",
              "refsource": "OVAL",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7359"
            },
            {
              "name": "oval:org.mitre.oval:def:10823",
              "refsource": "OVAL",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10823"
            },
            {
              "name": "http://git.kernel.org/?p=linux/kernel/git/x86/linux-2.6-tip.git%3Ba=commit%3Bh=24e35800cdc4350fc34e2bed37b608a9e13ab3b6",
              "refsource": "MISC",
              "tags": [],
              "url": "http://git.kernel.org/?p=linux/kernel/git/x86/linux-2.6-tip.git%3Ba=commit%3Bh=24e35800cdc4350fc34e2bed37b608a9e13ab3b6"
            }
          ]
        }
      },
      "impact": {
        "baseMetricV2": {
          "acInsufInfo": false,
          "cvssV2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "exploitabilityScore": 3.9,
          "impactScore": 2.9,
          "obtainAllPrivilege": false,
          "obtainOtherPrivilege": false,
          "obtainUserPrivilege": false,
          "severity": "LOW",
          "userInteractionRequired": false
        }
      },
      "lastModifiedDate": "2023-02-13T02:20Z",
      "publishedDate": "2009-10-20T17:30Z"
    }
  }
}
  ghsa-5pv7-vwpf-wfrm
Vulnerability from github
Published
2022-05-02 03:39
    Modified
2022-05-02 03:39
    
        VLAI Severity ?
      
      Details
arch/x86/ia32/ia32entry.S in the Linux kernel before 2.6.31.4 on the x86_64 platform does not clear certain kernel registers before a return to user mode, which allows local users to read register values from an earlier process by switching an ia32 process to 64-bit mode.
{
  "affected": [],
  "aliases": [
    "CVE-2009-2910"
  ],
  "database_specific": {
    "cwe_ids": [
      "CWE-200"
    ],
    "github_reviewed": false,
    "github_reviewed_at": null,
    "nvd_published_at": "2009-10-20T17:30:00Z",
    "severity": "LOW"
  },
  "details": "arch/x86/ia32/ia32entry.S in the Linux kernel before 2.6.31.4 on the x86_64 platform does not clear certain kernel registers before a return to user mode, which allows local users to read register values from an earlier process by switching an ia32 process to 64-bit mode.",
  "id": "GHSA-5pv7-vwpf-wfrm",
  "modified": "2022-05-02T03:39:56Z",
  "published": "2022-05-02T03:39:56Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2910"
    },
    {
      "type": "WEB",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=526788"
    },
    {
      "type": "WEB",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10823"
    },
    {
      "type": "WEB",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7359"
    },
    {
      "type": "WEB",
      "url": "https://rhn.redhat.com/errata/RHSA-2009-1540.html"
    },
    {
      "type": "WEB",
      "url": "https://rhn.redhat.com/errata/RHSA-2010-0046.html"
    },
    {
      "type": "WEB",
      "url": "https://rhn.redhat.com/errata/RHSA-2010-0095.html"
    },
    {
      "type": "WEB",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00483.html"
    },
    {
      "type": "WEB",
      "url": "http://git.kernel.org/?p=linux/kernel/git/x86/linux-2.6-tip.git%3Ba=commit%3Bh=24e35800cdc4350fc34e2bed37b608a9e13ab3b6"
    },
    {
      "type": "WEB",
      "url": "http://git.kernel.org/?p=linux/kernel/git/x86/linux-2.6-tip.git;a=commit;h=24e35800cdc4350fc34e2bed37b608a9e13ab3b6"
    },
    {
      "type": "WEB",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00005.html"
    },
    {
      "type": "WEB",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00007.html"
    },
    {
      "type": "WEB",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html"
    },
    {
      "type": "WEB",
      "url": "http://lkml.org/lkml/2009/10/1/164"
    },
    {
      "type": "WEB",
      "url": "http://marc.info/?l=oss-security\u0026m=125442304214452\u0026w=2"
    },
    {
      "type": "WEB",
      "url": "http://marc.info/?l=oss-security\u0026m=125444390112831\u0026w=2"
    },
    {
      "type": "WEB",
      "url": "http://marc.info/?l=oss-security\u0026m=125511635004768\u0026w=2"
    },
    {
      "type": "WEB",
      "url": "http://secunia.com/advisories/36927"
    },
    {
      "type": "WEB",
      "url": "http://secunia.com/advisories/37075"
    },
    {
      "type": "WEB",
      "url": "http://secunia.com/advisories/37351"
    },
    {
      "type": "WEB",
      "url": "http://support.avaya.com/css/P8/documents/100073666"
    },
    {
      "type": "WEB",
      "url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.31.4"
    },
    {
      "type": "WEB",
      "url": "http://www.openwall.com/lists/oss-security/2009/10/02/1"
    },
    {
      "type": "WEB",
      "url": "http://www.redhat.com/support/errata/RHSA-2009-1671.html"
    },
    {
      "type": "WEB",
      "url": "http://www.securityfocus.com/bid/36576"
    },
    {
      "type": "WEB",
      "url": "http://www.ubuntu.com/usn/usn-864-1"
    }
  ],
  "schema_version": "1.4.0",
  "severity": []
}
  Loading…
      Loading…
      Sightings
| Author | Source | Type | Date | 
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
 - Confirmed: The vulnerability is confirmed from an analyst perspective.
 - Published Proof of Concept: A public proof of concept is available for this vulnerability.
 - Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
 - Patched: This vulnerability was successfully patched by the user reporting the sighting.
 - Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
 - Not confirmed: The user expresses doubt about the veracity of the vulnerability.
 - Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
 
Loading…
      Loading…