Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2009-3620 (GCVE-0-2009-3620)
Vulnerability from cvelistv5
- n/a
 
{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T06:31:10.635Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[oss-security] 20091019 Re: CVE request: kernel: r128 IOCTL NULL pointer dereferences when CCE state is uninitialised",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2009/10/19/3"
          },
          {
            "name": "RHSA-2009:1671",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2009-1671.html"
          },
          {
            "name": "36824",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/36824"
          },
          {
            "name": "oval:org.mitre.oval:def:9891",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9891"
          },
          {
            "name": "RHSA-2009:1540",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://rhn.redhat.com/errata/RHSA-2009-1540.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529597"
          },
          {
            "name": "SUSE-SA:2009:061",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00002.html"
          },
          {
            "name": "USN-864-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/usn-864-1"
          },
          {
            "name": "38794",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/38794"
          },
          {
            "name": "[security-announce] 20100303 VMSA-2010-0004 ESX Service Console and vMA third party updates",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.vmware.com/pipermail/security-announce/2010/000082.html"
          },
          {
            "name": "36707",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/36707"
          },
          {
            "name": "MDVSA-2010:198",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:198"
          },
          {
            "name": "[linux-kernel] 20090921 [git pull] drm tree.",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://article.gmane.org/gmane.linux.kernel/892259"
          },
          {
            "name": "MDVSA-2010:088",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:088"
          },
          {
            "name": "SUSE-SA:2010:012",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.31-git11.log"
          },
          {
            "name": "37909",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/37909"
          },
          {
            "name": "oval:org.mitre.oval:def:6763",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6763"
          },
          {
            "name": "RHSA-2010:0882",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2010-0882.html"
          },
          {
            "name": "RHSA-2009:1670",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2009-1670.html"
          },
          {
            "name": "SUSE-SA:2009:064",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00005.html"
          },
          {
            "name": "[oss-security] 20091019 CVE request: kernel: r128 IOCTL NULL pointer dereferences when CCE state is uninitialised",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2009/10/19/1"
          },
          {
            "name": "38834",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/38834"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7dc482dfeeeefcfd000d4271c4626937406756d7"
          },
          {
            "name": "SUSE-SA:2010:013",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00007.html"
          },
          {
            "name": "FEDORA-2009-11038",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00190.html"
          },
          {
            "name": "ADV-2010-0528",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2010/0528"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-09-21T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The ATI Rage 128 (aka r128) driver in the Linux kernel before 2.6.31-git11 does not properly verify Concurrent Command Engine (CCE) state initialization, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly gain privileges via unspecified ioctl calls."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-18T12:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "[oss-security] 20091019 Re: CVE request: kernel: r128 IOCTL NULL pointer dereferences when CCE state is uninitialised",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2009/10/19/3"
        },
        {
          "name": "RHSA-2009:1671",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2009-1671.html"
        },
        {
          "name": "36824",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/36824"
        },
        {
          "name": "oval:org.mitre.oval:def:9891",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9891"
        },
        {
          "name": "RHSA-2009:1540",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://rhn.redhat.com/errata/RHSA-2009-1540.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529597"
        },
        {
          "name": "SUSE-SA:2009:061",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00002.html"
        },
        {
          "name": "USN-864-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/usn-864-1"
        },
        {
          "name": "38794",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/38794"
        },
        {
          "name": "[security-announce] 20100303 VMSA-2010-0004 ESX Service Console and vMA third party updates",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.vmware.com/pipermail/security-announce/2010/000082.html"
        },
        {
          "name": "36707",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/36707"
        },
        {
          "name": "MDVSA-2010:198",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:198"
        },
        {
          "name": "[linux-kernel] 20090921 [git pull] drm tree.",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://article.gmane.org/gmane.linux.kernel/892259"
        },
        {
          "name": "MDVSA-2010:088",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:088"
        },
        {
          "name": "SUSE-SA:2010:012",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.31-git11.log"
        },
        {
          "name": "37909",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/37909"
        },
        {
          "name": "oval:org.mitre.oval:def:6763",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6763"
        },
        {
          "name": "RHSA-2010:0882",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2010-0882.html"
        },
        {
          "name": "RHSA-2009:1670",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2009-1670.html"
        },
        {
          "name": "SUSE-SA:2009:064",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00005.html"
        },
        {
          "name": "[oss-security] 20091019 CVE request: kernel: r128 IOCTL NULL pointer dereferences when CCE state is uninitialised",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2009/10/19/1"
        },
        {
          "name": "38834",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/38834"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7dc482dfeeeefcfd000d4271c4626937406756d7"
        },
        {
          "name": "SUSE-SA:2010:013",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00007.html"
        },
        {
          "name": "FEDORA-2009-11038",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00190.html"
        },
        {
          "name": "ADV-2010-0528",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2010/0528"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2009-3620",
    "datePublished": "2009-10-22T15:26:00",
    "dateReserved": "2009-10-09T00:00:00",
    "dateUpdated": "2024-08-07T06:31:10.635Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2009-3620\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2009-10-22T16:00:00.577\",\"lastModified\":\"2025-04-09T00:30:58.490\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The ATI Rage 128 (aka r128) driver in the Linux kernel before 2.6.31-git11 does not properly verify Concurrent Command Engine (CCE) state initialization, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly gain privileges via unspecified ioctl calls.\"},{\"lang\":\"es\",\"value\":\"El controlador ATI Rage 128 (tambi\u00e9n conocido como r128), en el Kernel de Linux anterior a v2.6.31-git11 no verifica de forma adecuada el estado de inicializaci\u00f3n del \\\"Concurrent Command Engine (CCE)\\\", lo que permite a usuarios locales provocar una denegaci\u00f3n de servicio (desreferenciaci\u00f3n de puntero nulo y ca\u00edda del sistema) o posiblemente obtener privilegios a trav\u00e9s de llamadas ioctl sin especificar.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":4.9,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.9,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-476\"},{\"lang\":\"en\",\"value\":\"CWE-908\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.6.31.1\",\"matchCriteriaId\":\"7C1AF884-1852-4B68-AAC8-91E97CCE1201\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7000D33B-F3C7-43E8-8FC7-9B97AADC3E12\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"454A5D17-B171-4F1F-9E0B-F18D1E5CA9FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*\",\"matchCriteriaId\":\"7EBFE35C-E243-43D1-883D-4398D71763CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4747CC68-FAF4-482F-929A-9DA6C24CB663\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5D026D0-EF78-438D-BEDD-FC8571F3ACEB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2BCB73E-27BB-4878-AD9C-90C4F20C25A0\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:mrg_realtime:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04A20072-7DB7-4079-9456-E2CE98F888E7\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:suse:linux_enterprise_debuginfo:10:sp2:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E135846-8959-4D7E-A8E6-07F0EC15F010\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:suse:linux_enterprise_debuginfo:10:sp3:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E0623AA-88D4-4E53-AD50-C9AF8E0B0247\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B42AB65-443B-4655-BAEA-4EB4A43D9509\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_desktop:10:sp2:*:*:*:*:*:*\",\"matchCriteriaId\":\"513797E6-FCE6-4E84-9B66-202541F9601E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E496249-23A8-42FC-A109-634A54B5600F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA1E7EFF-1CCA-473B-8D5C-30D59C26DC70\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:10:sp2:*:*:-:*:*:*\",\"matchCriteriaId\":\"105187A7-2AFE-46F9-B0A9-F09C7E10BFBD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*\",\"matchCriteriaId\":\"79A35457-EAA3-4BF9-A4DA-B2E414A75A02\"}]}]}],\"references\":[{\"url\":\"http://article.gmane.org/gmane.linux.kernel/892259\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7dc482dfeeeefcfd000d4271c4626937406756d7\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00002.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00005.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00007.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.vmware.com/pipermail/security-announce/2010/000082.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/36707\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/37909\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/38794\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/38834\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.31-git11.log\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\",\"Patch\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2010:088\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2010:198\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2009/10/19/1\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Patch\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2009/10/19/3\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Patch\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2009-1670.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2009-1671.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0882.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.securityfocus.com/bid/36824\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/usn-864-1\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2010/0528\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=529597\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6763\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9891\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://rhn.redhat.com/errata/RHSA-2009-1540.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00190.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Release Notes\"]},{\"url\":\"http://article.gmane.org/gmane.linux.kernel/892259\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7dc482dfeeeefcfd000d4271c4626937406756d7\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00002.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00005.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00007.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.vmware.com/pipermail/security-announce/2010/000082.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/36707\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/37909\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/38794\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/38834\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.31-git11.log\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Patch\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2010:088\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2010:198\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2009/10/19/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Patch\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2009/10/19/3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Patch\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2009-1670.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2009-1671.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0882.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.securityfocus.com/bid/36824\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/usn-864-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2010/0528\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=529597\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6763\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9891\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://rhn.redhat.com/errata/RHSA-2009-1540.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00190.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Release Notes\"]}]}}"
  }
}
  RHSA-2009:1540
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated kernel-rt packages that fix several security issues, multiple bugs,\nand add enhancements are now available for Red Hat Enterprise MRG 1.1.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel-rt packages contain the Linux kernel, the core of any Linux\noperating system.\n\nSecurity fixes:\n\n* the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags were not cleared when a\nsetuid or setgid program was executed. A local, unprivileged user could use\nthis flaw to bypass the mmap_min_addr protection mechanism and perform a\nNULL pointer dereference attack, or bypass the Address Space Layout\nRandomization (ASLR) security feature. (CVE-2009-1895, Important)\n\n* a system with SELinux enforced was more permissive in allowing local\nusers in the unconfined_t domain to map low memory areas even if the\nmmap_min_addr restriction was enabled. This could aid in the local\nexploitation of NULL pointer dereference bugs. (CVE-2009-2695, Important)\n\n* missing initialization flaws were found in getname() implementations in\nnumerous network protocol implementations in the Linux kernel. Certain\ndata structures in these getname() implementations were not initialized\nproperly before being copied to user-space. These flaws could lead to an\ninformation leak. (CVE-2009-3002, Important)\n\n* a NULL pointer dereference flaw was found in each of the following\nfunctions in the Linux kernel: pipe_read_open(), pipe_write_open(), and\npipe_rdwr_open(). When the mutex lock is not held, the i_pipe pointer could\nbe released by other processes before it is used to update the pipe\u0027s\nreader and writer counters. This could lead to a local denial of service or\nprivilege escalation. (CVE-2009-3547, Important)\n\n* a flaw was found in the Realtek r8169 Ethernet driver in the Linux\nkernel. pci_unmap_single() presented a memory leak that could lead to IOMMU\nspace exhaustion and a system crash. An attacker on the local network could\nabuse this flaw by using jumbo frames for large amounts of network traffic.\n(CVE-2009-3613, Important)\n\n* NULL pointer dereference flaws were found in the r128 driver in the\nLinux kernel. Checks to test if the Concurrent Command Engine state was\ninitialized were missing in private IOCTL functions. An attacker could use\nthese flaws to cause a local denial of service or escalate their\nprivileges. (CVE-2009-3620, Important)\n\n* Kees Cook and Steve Beattie discovered a race condition in the /proc\ncode in the Linux kernel. This could lead to information in the\n\"/proc/[pid]/maps\" and \"/proc/[pid]/smaps\" files being leaked to users (who\nwould otherwise not have access to this information) during ELF loading.\nThis could help a local attacker bypass the ASLR security feature.\n(CVE-2009-2691, Moderate)\n\n* a NULL pointer dereference flaw was found in the md driver in the Linux\nkernel. If the suspend_lo or suspend_hi file in \"/sys/\" is modified when\nthe disk array is inactive, it could lead to a local denial of service or\nprivilege escalation. By default, only root can write to these two files.\n(CVE-2009-2849, Moderate)\n\n* an information leak was found in the Linux kernel. On AMD64 systems,\n32-bit processes could access and read certain 64-bit registers by\ntemporarily switching themselves to 64-bit mode. (CVE-2009-2910, Moderate)\n\n* padding data in several core network structures was not initialized\nproperly before being sent to user-space, possibly leading to information\nleaks. (CVE-2009-3228, CVE-2009-3612, Moderate)\n\n* the unix_stream_connect() function in the Linux kernel did not check if a\nUNIX domain socket was in the shutdown state. This could lead to a\ndeadlock. A local, unprivileged user could use this flaw to cause a denial\nof service. (CVE-2009-3621, Moderate)\n\nThese updated packages also include bug fixes and enhancements. Users are\ndirected to the Realtime Security Update Release Notes for version 1.1 for\ninformation on these changes, which will be available shortly from: \n\nhttp://www.redhat.com/docs/en-US/Red_Hat_Enterprise_MRG/\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues and add enhancements. The system must be\nrebooted for this update to take effect.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2009:1540",
        "url": "https://access.redhat.com/errata/RHSA-2009:1540"
      },
      {
        "category": "external",
        "summary": "http://www.redhat.com/security/updates/classification/#important",
        "url": "http://www.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "http://kbase.redhat.com/faq/docs/DOC-18042",
        "url": "http://kbase.redhat.com/faq/docs/DOC-18042"
      },
      {
        "category": "external",
        "summary": "http://kbase.redhat.com/faq/docs/DOC-17866",
        "url": "http://kbase.redhat.com/faq/docs/DOC-17866"
      },
      {
        "category": "external",
        "summary": "529597",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529597"
      },
      {
        "category": "external",
        "summary": "529626",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529626"
      },
      {
        "category": "external",
        "summary": "530490",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=530490"
      },
      {
        "category": "external",
        "summary": "http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_MRG/",
        "url": "http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_MRG/"
      },
      {
        "category": "external",
        "summary": "511171",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=511171"
      },
      {
        "category": "external",
        "summary": "516171",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=516171"
      },
      {
        "category": "external",
        "summary": "517830",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=517830"
      },
      {
        "category": "external",
        "summary": "518132",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=518132"
      },
      {
        "category": "external",
        "summary": "518160",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=518160"
      },
      {
        "category": "external",
        "summary": "519305",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=519305"
      },
      {
        "category": "external",
        "summary": "520990",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=520990"
      },
      {
        "category": "external",
        "summary": "521999",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=521999"
      },
      {
        "category": "external",
        "summary": "522359",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=522359"
      },
      {
        "category": "external",
        "summary": "522501",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=522501"
      },
      {
        "category": "external",
        "summary": "522503",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=522503"
      },
      {
        "category": "external",
        "summary": "523986",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=523986"
      },
      {
        "category": "external",
        "summary": "526788",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=526788"
      },
      {
        "category": "external",
        "summary": "528139",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=528139"
      },
      {
        "category": "external",
        "summary": "528868",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=528868"
      },
      {
        "category": "external",
        "summary": "529137",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529137"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1540.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel-rt security, bug fix, and enhancement update",
    "tracking": {
      "current_release_date": "2025-10-09T13:22:11+00:00",
      "generator": {
        "date": "2025-10-09T13:22:11+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2009:1540",
      "initial_release_date": "2009-11-03T18:21:00+00:00",
      "revision_history": [
        {
          "date": "2009-11-03T18:21:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2009-11-03T13:21:07+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T13:22:11+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "MRG Realtime for RHEL 5 Server",
                "product": {
                  "name": "MRG Realtime for RHEL 5 Server",
                  "product_id": "5Server-MRG-Realtime-1.0",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_mrg:1::el5"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise MRG for RHEL-5"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
                "product": {
                  "name": "kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
                  "product_id": "kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@2.6.24.7-137.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
                "product": {
                  "name": "kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
                  "product_id": "kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@2.6.24.7-137.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
                "product": {
                  "name": "kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
                  "product_id": "kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug@2.6.24.7-137.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
                "product": {
                  "name": "kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
                  "product_id": "kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-devel@2.6.24.7-137.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
                "product": {
                  "name": "kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
                  "product_id": "kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-vanilla@2.6.24.7-137.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
                "product": {
                  "name": "kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
                  "product_id": "kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@2.6.24.7-137.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-0:2.6.24.7-137.el5rt.i686",
                "product": {
                  "name": "kernel-rt-0:2.6.24.7-137.el5rt.i686",
                  "product_id": "kernel-rt-0:2.6.24.7-137.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-137.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
                "product": {
                  "name": "kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
                  "product_id": "kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace@2.6.24.7-137.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
                "product": {
                  "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
                  "product_id": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@2.6.24.7-137.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
                "product": {
                  "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
                  "product_id": "kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@2.6.24.7-137.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
                "product": {
                  "name": "kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
                  "product_id": "kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common@2.6.24.7-137.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
                "product": {
                  "name": "kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
                  "product_id": "kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@2.6.24.7-137.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
                "product": {
                  "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
                  "product_id": "kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@2.6.24.7-137.el5rt?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
                  "product_id": "kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@2.6.24.7-137.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64",
                  "product_id": "kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@2.6.24.7-137.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
                  "product_id": "kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug@2.6.24.7-137.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
                  "product_id": "kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-devel@2.6.24.7-137.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
                  "product_id": "kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-vanilla@2.6.24.7-137.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
                  "product_id": "kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@2.6.24.7-137.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
                  "product_id": "kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-137.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
                  "product_id": "kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace@2.6.24.7-137.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
                  "product_id": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@2.6.24.7-137.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
                  "product_id": "kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@2.6.24.7-137.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
                  "product_id": "kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common@2.6.24.7-137.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
                  "product_id": "kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@2.6.24.7-137.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
                  "product_id": "kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@2.6.24.7-137.el5rt?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
                "product": {
                  "name": "kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
                  "product_id": "kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-doc@2.6.24.7-137.el5rt?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-0:2.6.24.7-137.el5rt.src",
                "product": {
                  "name": "kernel-rt-0:2.6.24.7-137.el5rt.src",
                  "product_id": "kernel-rt-0:2.6.24.7-137.el5rt.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-137.el5rt?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:2.6.24.7-137.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686"
        },
        "product_reference": "kernel-rt-0:2.6.24.7-137.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:2.6.24.7-137.el5rt.src as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src"
        },
        "product_reference": "kernel-rt-0:2.6.24.7-137.el5rt.src",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:2.6.24.7-137.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-0:2.6.24.7-137.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686"
        },
        "product_reference": "kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686"
        },
        "product_reference": "kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686"
        },
        "product_reference": "kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686"
        },
        "product_reference": "kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686"
        },
        "product_reference": "kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-0:2.6.24.7-137.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686"
        },
        "product_reference": "kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch"
        },
        "product_reference": "kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-0:2.6.24.7-137.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686"
        },
        "product_reference": "kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686"
        },
        "product_reference": "kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686"
        },
        "product_reference": "kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686"
        },
        "product_reference": "kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686"
        },
        "product_reference": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686"
        },
        "product_reference": "kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2009-1895",
      "discovery_date": "2009-06-30T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "511171"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The personality subsystem in the Linux kernel before 2.6.31-rc3 has a PER_CLEAR_ON_SETID setting that does not clear the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags when executing a setuid or setgid program, which makes it easier for local users to leverage the details of memory usage to (1) conduct NULL pointer dereference attacks, (2) bypass the mmap_min_addr protection mechanism, or (3) defeat address space layout randomization (ASLR).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: personality: fix PER_CLEAR_ON_SETID",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1895"
        },
        {
          "category": "external",
          "summary": "RHBZ#511171",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=511171"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1895",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1895"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1895",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1895"
        }
      ],
      "release_date": "2009-06-26T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T18:21:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1540"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: personality: fix PER_CLEAR_ON_SETID"
    },
    {
      "cve": "CVE-2009-2691",
      "discovery_date": "2009-08-07T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "516171"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The mm_for_maps function in fs/proc/base.c in the Linux kernel 2.6.30.4 and earlier allows local users to read (1) maps and (2) smaps files under proc/ via vectors related to ELF loading, a setuid process, and a race condition.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: /proc/$pid/maps visible during initial setuid ELF loading",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "We currently have no plans to fix this flaw in Red Hat Enterprise Linux 3, 4, and 5 as it is not possible to trigger the information leak if the suid_dumpable tunable is set to zero (which is the default).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-2691"
        },
        {
          "category": "external",
          "summary": "RHBZ#516171",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=516171"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2691",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-2691"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2691",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2691"
        }
      ],
      "release_date": "2009-07-10T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T18:21:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1540"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: /proc/$pid/maps visible during initial setuid ELF loading"
    },
    {
      "cve": "CVE-2009-2695",
      "discovery_date": "2009-08-17T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "517830"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The Linux kernel before 2.6.31-rc7 does not properly prevent mmap operations that target page zero and other low memory addresses, which allows local users to gain privileges by exploiting NULL pointer dereference vulnerabilities, related to (1) the default configuration of the allow_unconfined_mmap_low boolean in SELinux on Red Hat Enterprise Linux (RHEL) 5, (2) an error that causes allow_unconfined_mmap_low to be ignored in the unconfined_t domain, (3) lack of a requirement for the CAP_SYS_RAWIO capability for these mmap operations, and (4) interaction between the mmap_min_addr protection mechanism and certain application programs.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: SELinux and mmap_min_addr",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-2695"
        },
        {
          "category": "external",
          "summary": "RHBZ#517830",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=517830"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2695",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-2695"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2695",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2695"
        }
      ],
      "release_date": "2009-07-31T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T18:21:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1540"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: SELinux and mmap_min_addr"
    },
    {
      "cve": "CVE-2009-2849",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2009-08-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "518132"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The md driver (drivers/md/md.c) in the Linux kernel before 2.6.30.2 might allow local users to cause a denial of service (NULL pointer dereference) via vectors related to \"suspend_* sysfs attributes\" and the (1) suspend_lo_store or (2) suspend_hi_store functions.  NOTE: this is only a vulnerability when sysfs is writable by an attacker.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: md: NULL pointer deref when accessing suspend_* sysfs attributes",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The flaw was introduced in kernel version 2.6.17-rc1. The Linux kernel as shipped with Red Hat Enterprise Linux 3, and 4 are not affected by this issue.\n\nA future kernel update for Red Hat Enterprise Linux 5 will address this flaw.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-2849"
        },
        {
          "category": "external",
          "summary": "RHBZ#518132",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=518132"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2849",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-2849"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2849",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2849"
        }
      ],
      "release_date": "2009-07-01T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T18:21:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1540"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "HIGH",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.2,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: md: NULL pointer deref when accessing suspend_* sysfs attributes"
    },
    {
      "cve": "CVE-2009-2910",
      "discovery_date": "2009-10-01T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "526788"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "arch/x86/ia32/ia32entry.S in the Linux kernel before 2.6.31.4 on the x86_64 platform does not clear certain kernel registers before a return to user mode, which allows local users to read register values from an earlier process by switching an ia32 process to 64-bit mode.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: x86_64 32 bit process register leak",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is not planned to be fixed in Red Hat Enterprise Linux 3, due to this product being in Production 3 of its maintenance life-cycle, where only qualified security errata of important and critical impact are addressed.\n\nFor further information about Errata Support Policy, visit: https://access.redhat.com/support/policy/updates/errata/",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-2910"
        },
        {
          "category": "external",
          "summary": "RHBZ#526788",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=526788"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2910",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-2910"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2910",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2910"
        }
      ],
      "release_date": "2009-10-01T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T18:21:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1540"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: x86_64 32 bit process register leak"
    },
    {
      "cve": "CVE-2009-3002",
      "discovery_date": "2009-08-26T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "519305"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The Linux kernel before 2.6.31-rc7 does not initialize certain data structures within getname functions, which allows local users to read the contents of some kernel memory locations by calling getsockname on (1) an AF_APPLETALK socket, related to the atalk_getname function in net/appletalk/ddp.c; (2) an AF_IRDA socket, related to the irda_getname function in net/irda/af_irda.c; (3) an AF_ECONET socket, related to the econet_getname function in net/econet/af_econet.c; (4) an AF_NETROM socket, related to the nr_getname function in net/netrom/af_netrom.c; (5) an AF_ROSE socket, related to the rose_getname function in net/rose/af_rose.c; or (6) a raw CAN socket, related to the raw_getname function in net/can/raw.c.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: numerous getname() infoleaks",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "CVE-2009-3002 describes a collection of similar information leaks that affect numerous networking protocols.\n\nThe Linux kernel as shipped with Red Hat Enterprise Linux 4 and 5 did not enable support for the AppleTalk DDP protocol, and therefore were not affected by issue (1).\n\nThe Linux kernel as shipped with Red Hat Enterprise Linux 4, 5 and Red Hat Enterprise MRG did not enable support for IrDA sockets, and therefore were not affected by issue (2).\n\nThe Linux kernel as shipped with Red Hat Enterprise Linux 3, 4, 5, and Red Hat Enterprise MRG did not enable support for the Acorn Econet and AUN protocols, and therefore were not affected by issue (3).\n\nThe Linux kernel as shipped with Red Hat Enterprise Linux 4, 5, and Red Hat Enterprise MRG did not enable support for the NET/ROM and ROSE protocols, and therefore were not affected by issues (4) and (5).\n\nThe raw_getname() leak was introduced in the Linux kernel version 2.6.25-rc1. The Linux kernel as shipped with Red Hat Enterprise Linux 3, 4, 5, and Red Hat Enterprise MRG therefore were not affected by issue (6).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3002"
        },
        {
          "category": "external",
          "summary": "RHBZ#519305",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=519305"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3002",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3002"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3002",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3002"
        }
      ],
      "release_date": "2009-08-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T18:21:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1540"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: numerous getname() infoleaks"
    },
    {
      "cve": "CVE-2009-3228",
      "cwe": {
        "id": "CWE-401",
        "name": "Missing Release of Memory after Effective Lifetime"
      },
      "discovery_date": "2009-09-03T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "520990"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The tc_fill_tclass function in net/sched/sch_api.c in the tc subsystem in the Linux kernel 2.4.x before 2.4.37.6 and 2.6.x before 2.6.31-rc9 does not initialize certain (1) tcm__pad1 and (2) tcm__pad2 structure members, which might allow local users to obtain sensitive information from kernel memory via unspecified vectors.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: tc: uninitialised kernel memory leak",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3228"
        },
        {
          "category": "external",
          "summary": "RHBZ#520990",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=520990"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3228",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3228"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3228",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3228"
        }
      ],
      "release_date": "2009-09-02T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T18:21:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1540"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: tc: uninitialised kernel memory leak"
    },
    {
      "cve": "CVE-2009-3547",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2009-10-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "530490"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Multiple race conditions in fs/pipe.c in the Linux kernel before 2.6.32-rc6 allow local users to cause a denial of service (NULL pointer dereference and system crash) or gain privileges by attempting to open an anonymous pipe via a /proc/*/fd/ pathname.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: fs: pipe.c null pointer dereference",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3547"
        },
        {
          "category": "external",
          "summary": "RHBZ#530490",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=530490"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3547",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3547"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3547",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3547"
        }
      ],
      "release_date": "2009-10-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T18:21:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1540"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: fs: pipe.c null pointer dereference"
    },
    {
      "cve": "CVE-2009-3612",
      "discovery_date": "2009-10-14T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "528868"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The tcf_fill_node function in net/sched/cls_api.c in the netlink subsystem in the Linux kernel 2.6.x before 2.6.32-rc5, and 2.4.37.6 and earlier, does not initialize a certain tcm__pad2 structure member, which might allow local users to obtain sensitive information from kernel memory via unspecified vectors.  NOTE: this issue exists because of an incomplete fix for CVE-2005-4881.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: tcf_fill_node() infoleak due to typo in 9ef1d4c7",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is not planned to be fixed in Red Hat Enterprise Linux 3 due to this product being in Production 3 of its maintenance life-cycle, where only qualified security errata of important or critical impact are addressed.\n\nFor further information about the Errata Support Policy, visit: https://access.redhat.com/support/policy/updates/errata/",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3612"
        },
        {
          "category": "external",
          "summary": "RHBZ#528868",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=528868"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3612",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3612"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3612",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3612"
        }
      ],
      "release_date": "2009-10-08T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T18:21:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1540"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: tcf_fill_node() infoleak due to typo in 9ef1d4c7"
    },
    {
      "cve": "CVE-2009-3613",
      "discovery_date": "2009-10-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "529137"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The swiotlb functionality in the r8169 driver in drivers/net/r8169.c in the Linux kernel before 2.6.27.22 allows remote attackers to cause a denial of service (IOMMU space exhaustion and system crash) by using jumbo frames for a large amount of network traffic, as demonstrated by a flood ping.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: flood ping cause out-of-iommu error and panic when mtu larger than 1500",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3613"
        },
        {
          "category": "external",
          "summary": "RHBZ#529137",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529137"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3613",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3613"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3613",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3613"
        }
      ],
      "release_date": "2007-11-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T18:21:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1540"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: flood ping cause out-of-iommu error and panic when mtu larger than 1500"
    },
    {
      "cve": "CVE-2009-3620",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2009-10-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "529597"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The ATI Rage 128 (aka r128) driver in the Linux kernel before 2.6.31-git11 does not properly verify Concurrent Command Engine (CCE) state initialization, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly gain privileges via unspecified ioctl calls.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: r128 IOCTL NULL pointer dereferences when CCE state is uninitialised",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3620"
        },
        {
          "category": "external",
          "summary": "RHBZ#529597",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529597"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3620",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3620"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3620",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3620"
        }
      ],
      "release_date": "2009-08-30T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T18:21:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1540"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.9,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: r128 IOCTL NULL pointer dereferences when CCE state is uninitialised"
    },
    {
      "cve": "CVE-2009-3621",
      "discovery_date": "2009-10-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "529626"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "net/unix/af_unix.c in the Linux kernel 2.6.31.4 and earlier allows local users to cause a denial of service (system hang) by creating an abstract-namespace AF_UNIX listening socket, performing a shutdown operation on this socket, and then performing a series of connect operations to this socket.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: AF_UNIX: Fix deadlock on connecting to shutdown socket",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is not planned to be fixed in Red Hat Enterprise Linux 3, due to this product being in Production 3 of its maintenance life-cycle, where only qualified security errata of important or critical impact are addressed.\n\nFor further information about Errata Support Policy, visit: https://access.redhat.com/support/policy/updates/errata/",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3621"
        },
        {
          "category": "external",
          "summary": "RHBZ#529626",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529626"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3621",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3621"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3621",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3621"
        }
      ],
      "release_date": "2009-10-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T18:21:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1540"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.9,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: AF_UNIX: Fix deadlock on connecting to shutdown socket"
    }
  ]
}
  rhsa-2009_1540
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated kernel-rt packages that fix several security issues, multiple bugs,\nand add enhancements are now available for Red Hat Enterprise MRG 1.1.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel-rt packages contain the Linux kernel, the core of any Linux\noperating system.\n\nSecurity fixes:\n\n* the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags were not cleared when a\nsetuid or setgid program was executed. A local, unprivileged user could use\nthis flaw to bypass the mmap_min_addr protection mechanism and perform a\nNULL pointer dereference attack, or bypass the Address Space Layout\nRandomization (ASLR) security feature. (CVE-2009-1895, Important)\n\n* a system with SELinux enforced was more permissive in allowing local\nusers in the unconfined_t domain to map low memory areas even if the\nmmap_min_addr restriction was enabled. This could aid in the local\nexploitation of NULL pointer dereference bugs. (CVE-2009-2695, Important)\n\n* missing initialization flaws were found in getname() implementations in\nnumerous network protocol implementations in the Linux kernel. Certain\ndata structures in these getname() implementations were not initialized\nproperly before being copied to user-space. These flaws could lead to an\ninformation leak. (CVE-2009-3002, Important)\n\n* a NULL pointer dereference flaw was found in each of the following\nfunctions in the Linux kernel: pipe_read_open(), pipe_write_open(), and\npipe_rdwr_open(). When the mutex lock is not held, the i_pipe pointer could\nbe released by other processes before it is used to update the pipe\u0027s\nreader and writer counters. This could lead to a local denial of service or\nprivilege escalation. (CVE-2009-3547, Important)\n\n* a flaw was found in the Realtek r8169 Ethernet driver in the Linux\nkernel. pci_unmap_single() presented a memory leak that could lead to IOMMU\nspace exhaustion and a system crash. An attacker on the local network could\nabuse this flaw by using jumbo frames for large amounts of network traffic.\n(CVE-2009-3613, Important)\n\n* NULL pointer dereference flaws were found in the r128 driver in the\nLinux kernel. Checks to test if the Concurrent Command Engine state was\ninitialized were missing in private IOCTL functions. An attacker could use\nthese flaws to cause a local denial of service or escalate their\nprivileges. (CVE-2009-3620, Important)\n\n* Kees Cook and Steve Beattie discovered a race condition in the /proc\ncode in the Linux kernel. This could lead to information in the\n\"/proc/[pid]/maps\" and \"/proc/[pid]/smaps\" files being leaked to users (who\nwould otherwise not have access to this information) during ELF loading.\nThis could help a local attacker bypass the ASLR security feature.\n(CVE-2009-2691, Moderate)\n\n* a NULL pointer dereference flaw was found in the md driver in the Linux\nkernel. If the suspend_lo or suspend_hi file in \"/sys/\" is modified when\nthe disk array is inactive, it could lead to a local denial of service or\nprivilege escalation. By default, only root can write to these two files.\n(CVE-2009-2849, Moderate)\n\n* an information leak was found in the Linux kernel. On AMD64 systems,\n32-bit processes could access and read certain 64-bit registers by\ntemporarily switching themselves to 64-bit mode. (CVE-2009-2910, Moderate)\n\n* padding data in several core network structures was not initialized\nproperly before being sent to user-space, possibly leading to information\nleaks. (CVE-2009-3228, CVE-2009-3612, Moderate)\n\n* the unix_stream_connect() function in the Linux kernel did not check if a\nUNIX domain socket was in the shutdown state. This could lead to a\ndeadlock. A local, unprivileged user could use this flaw to cause a denial\nof service. (CVE-2009-3621, Moderate)\n\nThese updated packages also include bug fixes and enhancements. Users are\ndirected to the Realtime Security Update Release Notes for version 1.1 for\ninformation on these changes, which will be available shortly from: \n\nhttp://www.redhat.com/docs/en-US/Red_Hat_Enterprise_MRG/\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues and add enhancements. The system must be\nrebooted for this update to take effect.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2009:1540",
        "url": "https://access.redhat.com/errata/RHSA-2009:1540"
      },
      {
        "category": "external",
        "summary": "http://www.redhat.com/security/updates/classification/#important",
        "url": "http://www.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "http://kbase.redhat.com/faq/docs/DOC-18042",
        "url": "http://kbase.redhat.com/faq/docs/DOC-18042"
      },
      {
        "category": "external",
        "summary": "http://kbase.redhat.com/faq/docs/DOC-17866",
        "url": "http://kbase.redhat.com/faq/docs/DOC-17866"
      },
      {
        "category": "external",
        "summary": "http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_MRG/",
        "url": "http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_MRG/"
      },
      {
        "category": "external",
        "summary": "511171",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=511171"
      },
      {
        "category": "external",
        "summary": "516171",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=516171"
      },
      {
        "category": "external",
        "summary": "517830",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=517830"
      },
      {
        "category": "external",
        "summary": "518132",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=518132"
      },
      {
        "category": "external",
        "summary": "518160",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=518160"
      },
      {
        "category": "external",
        "summary": "519305",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=519305"
      },
      {
        "category": "external",
        "summary": "520990",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=520990"
      },
      {
        "category": "external",
        "summary": "521999",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=521999"
      },
      {
        "category": "external",
        "summary": "522359",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=522359"
      },
      {
        "category": "external",
        "summary": "522501",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=522501"
      },
      {
        "category": "external",
        "summary": "522503",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=522503"
      },
      {
        "category": "external",
        "summary": "523986",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=523986"
      },
      {
        "category": "external",
        "summary": "526788",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=526788"
      },
      {
        "category": "external",
        "summary": "528139",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=528139"
      },
      {
        "category": "external",
        "summary": "528868",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=528868"
      },
      {
        "category": "external",
        "summary": "529137",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529137"
      },
      {
        "category": "external",
        "summary": "529597",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529597"
      },
      {
        "category": "external",
        "summary": "529626",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529626"
      },
      {
        "category": "external",
        "summary": "530490",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=530490"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1540.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel-rt security, bug fix, and enhancement update",
    "tracking": {
      "current_release_date": "2024-11-22T03:26:34+00:00",
      "generator": {
        "date": "2024-11-22T03:26:34+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2009:1540",
      "initial_release_date": "2009-11-03T18:21:00+00:00",
      "revision_history": [
        {
          "date": "2009-11-03T18:21:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2009-11-03T13:21:07+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-22T03:26:34+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "MRG Realtime for RHEL 5 Server",
                "product": {
                  "name": "MRG Realtime for RHEL 5 Server",
                  "product_id": "5Server-MRG-Realtime-1.0",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_mrg:1::el5"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise MRG for RHEL-5"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
                "product": {
                  "name": "kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
                  "product_id": "kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@2.6.24.7-137.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
                "product": {
                  "name": "kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
                  "product_id": "kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@2.6.24.7-137.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
                "product": {
                  "name": "kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
                  "product_id": "kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug@2.6.24.7-137.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
                "product": {
                  "name": "kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
                  "product_id": "kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-devel@2.6.24.7-137.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
                "product": {
                  "name": "kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
                  "product_id": "kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-vanilla@2.6.24.7-137.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
                "product": {
                  "name": "kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
                  "product_id": "kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@2.6.24.7-137.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-0:2.6.24.7-137.el5rt.i686",
                "product": {
                  "name": "kernel-rt-0:2.6.24.7-137.el5rt.i686",
                  "product_id": "kernel-rt-0:2.6.24.7-137.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-137.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
                "product": {
                  "name": "kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
                  "product_id": "kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace@2.6.24.7-137.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
                "product": {
                  "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
                  "product_id": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@2.6.24.7-137.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
                "product": {
                  "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
                  "product_id": "kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@2.6.24.7-137.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
                "product": {
                  "name": "kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
                  "product_id": "kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common@2.6.24.7-137.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
                "product": {
                  "name": "kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
                  "product_id": "kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@2.6.24.7-137.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
                "product": {
                  "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
                  "product_id": "kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@2.6.24.7-137.el5rt?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
                  "product_id": "kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@2.6.24.7-137.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64",
                  "product_id": "kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@2.6.24.7-137.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
                  "product_id": "kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug@2.6.24.7-137.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
                  "product_id": "kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-devel@2.6.24.7-137.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
                  "product_id": "kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-vanilla@2.6.24.7-137.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
                  "product_id": "kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@2.6.24.7-137.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
                  "product_id": "kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-137.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
                  "product_id": "kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace@2.6.24.7-137.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
                  "product_id": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@2.6.24.7-137.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
                  "product_id": "kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@2.6.24.7-137.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
                  "product_id": "kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common@2.6.24.7-137.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
                  "product_id": "kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@2.6.24.7-137.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
                  "product_id": "kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@2.6.24.7-137.el5rt?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
                "product": {
                  "name": "kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
                  "product_id": "kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-doc@2.6.24.7-137.el5rt?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-0:2.6.24.7-137.el5rt.src",
                "product": {
                  "name": "kernel-rt-0:2.6.24.7-137.el5rt.src",
                  "product_id": "kernel-rt-0:2.6.24.7-137.el5rt.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-137.el5rt?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:2.6.24.7-137.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686"
        },
        "product_reference": "kernel-rt-0:2.6.24.7-137.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:2.6.24.7-137.el5rt.src as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src"
        },
        "product_reference": "kernel-rt-0:2.6.24.7-137.el5rt.src",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:2.6.24.7-137.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-0:2.6.24.7-137.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686"
        },
        "product_reference": "kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686"
        },
        "product_reference": "kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686"
        },
        "product_reference": "kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686"
        },
        "product_reference": "kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686"
        },
        "product_reference": "kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-0:2.6.24.7-137.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686"
        },
        "product_reference": "kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch"
        },
        "product_reference": "kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-0:2.6.24.7-137.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686"
        },
        "product_reference": "kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686"
        },
        "product_reference": "kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686"
        },
        "product_reference": "kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686"
        },
        "product_reference": "kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686"
        },
        "product_reference": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686"
        },
        "product_reference": "kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2009-1895",
      "discovery_date": "2009-06-30T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "511171"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The personality subsystem in the Linux kernel before 2.6.31-rc3 has a PER_CLEAR_ON_SETID setting that does not clear the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags when executing a setuid or setgid program, which makes it easier for local users to leverage the details of memory usage to (1) conduct NULL pointer dereference attacks, (2) bypass the mmap_min_addr protection mechanism, or (3) defeat address space layout randomization (ASLR).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: personality: fix PER_CLEAR_ON_SETID",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1895"
        },
        {
          "category": "external",
          "summary": "RHBZ#511171",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=511171"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1895",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1895"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1895",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1895"
        }
      ],
      "release_date": "2009-06-26T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T18:21:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1540"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: personality: fix PER_CLEAR_ON_SETID"
    },
    {
      "cve": "CVE-2009-2691",
      "discovery_date": "2009-08-07T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "516171"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The mm_for_maps function in fs/proc/base.c in the Linux kernel 2.6.30.4 and earlier allows local users to read (1) maps and (2) smaps files under proc/ via vectors related to ELF loading, a setuid process, and a race condition.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: /proc/$pid/maps visible during initial setuid ELF loading",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "We currently have no plans to fix this flaw in Red Hat Enterprise Linux 3, 4, and 5 as it is not possible to trigger the information leak if the suid_dumpable tunable is set to zero (which is the default).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-2691"
        },
        {
          "category": "external",
          "summary": "RHBZ#516171",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=516171"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2691",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-2691"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2691",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2691"
        }
      ],
      "release_date": "2009-07-10T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T18:21:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1540"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: /proc/$pid/maps visible during initial setuid ELF loading"
    },
    {
      "cve": "CVE-2009-2695",
      "discovery_date": "2009-08-17T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "517830"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The Linux kernel before 2.6.31-rc7 does not properly prevent mmap operations that target page zero and other low memory addresses, which allows local users to gain privileges by exploiting NULL pointer dereference vulnerabilities, related to (1) the default configuration of the allow_unconfined_mmap_low boolean in SELinux on Red Hat Enterprise Linux (RHEL) 5, (2) an error that causes allow_unconfined_mmap_low to be ignored in the unconfined_t domain, (3) lack of a requirement for the CAP_SYS_RAWIO capability for these mmap operations, and (4) interaction between the mmap_min_addr protection mechanism and certain application programs.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: SELinux and mmap_min_addr",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-2695"
        },
        {
          "category": "external",
          "summary": "RHBZ#517830",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=517830"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2695",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-2695"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2695",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2695"
        }
      ],
      "release_date": "2009-07-31T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T18:21:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1540"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: SELinux and mmap_min_addr"
    },
    {
      "cve": "CVE-2009-2849",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2009-08-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "518132"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The md driver (drivers/md/md.c) in the Linux kernel before 2.6.30.2 might allow local users to cause a denial of service (NULL pointer dereference) via vectors related to \"suspend_* sysfs attributes\" and the (1) suspend_lo_store or (2) suspend_hi_store functions.  NOTE: this is only a vulnerability when sysfs is writable by an attacker.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: md: NULL pointer deref when accessing suspend_* sysfs attributes",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The flaw was introduced in kernel version 2.6.17-rc1. The Linux kernel as shipped with Red Hat Enterprise Linux 3, and 4 are not affected by this issue.\n\nA future kernel update for Red Hat Enterprise Linux 5 will address this flaw.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-2849"
        },
        {
          "category": "external",
          "summary": "RHBZ#518132",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=518132"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2849",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-2849"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2849",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2849"
        }
      ],
      "release_date": "2009-07-01T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T18:21:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1540"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "HIGH",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.2,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: md: NULL pointer deref when accessing suspend_* sysfs attributes"
    },
    {
      "cve": "CVE-2009-2910",
      "discovery_date": "2009-10-01T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "526788"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "arch/x86/ia32/ia32entry.S in the Linux kernel before 2.6.31.4 on the x86_64 platform does not clear certain kernel registers before a return to user mode, which allows local users to read register values from an earlier process by switching an ia32 process to 64-bit mode.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: x86_64 32 bit process register leak",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is not planned to be fixed in Red Hat Enterprise Linux 3, due to this product being in Production 3 of its maintenance life-cycle, where only qualified security errata of important and critical impact are addressed.\n\nFor further information about Errata Support Policy, visit: https://access.redhat.com/support/policy/updates/errata/",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-2910"
        },
        {
          "category": "external",
          "summary": "RHBZ#526788",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=526788"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2910",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-2910"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2910",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2910"
        }
      ],
      "release_date": "2009-10-01T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T18:21:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1540"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: x86_64 32 bit process register leak"
    },
    {
      "cve": "CVE-2009-3002",
      "discovery_date": "2009-08-26T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "519305"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The Linux kernel before 2.6.31-rc7 does not initialize certain data structures within getname functions, which allows local users to read the contents of some kernel memory locations by calling getsockname on (1) an AF_APPLETALK socket, related to the atalk_getname function in net/appletalk/ddp.c; (2) an AF_IRDA socket, related to the irda_getname function in net/irda/af_irda.c; (3) an AF_ECONET socket, related to the econet_getname function in net/econet/af_econet.c; (4) an AF_NETROM socket, related to the nr_getname function in net/netrom/af_netrom.c; (5) an AF_ROSE socket, related to the rose_getname function in net/rose/af_rose.c; or (6) a raw CAN socket, related to the raw_getname function in net/can/raw.c.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: numerous getname() infoleaks",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "CVE-2009-3002 describes a collection of similar information leaks that affect numerous networking protocols.\n\nThe Linux kernel as shipped with Red Hat Enterprise Linux 4 and 5 did not enable support for the AppleTalk DDP protocol, and therefore were not affected by issue (1).\n\nThe Linux kernel as shipped with Red Hat Enterprise Linux 4, 5 and Red Hat Enterprise MRG did not enable support for IrDA sockets, and therefore were not affected by issue (2).\n\nThe Linux kernel as shipped with Red Hat Enterprise Linux 3, 4, 5, and Red Hat Enterprise MRG did not enable support for the Acorn Econet and AUN protocols, and therefore were not affected by issue (3).\n\nThe Linux kernel as shipped with Red Hat Enterprise Linux 4, 5, and Red Hat Enterprise MRG did not enable support for the NET/ROM and ROSE protocols, and therefore were not affected by issues (4) and (5).\n\nThe raw_getname() leak was introduced in the Linux kernel version 2.6.25-rc1. The Linux kernel as shipped with Red Hat Enterprise Linux 3, 4, 5, and Red Hat Enterprise MRG therefore were not affected by issue (6).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3002"
        },
        {
          "category": "external",
          "summary": "RHBZ#519305",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=519305"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3002",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3002"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3002",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3002"
        }
      ],
      "release_date": "2009-08-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T18:21:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1540"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: numerous getname() infoleaks"
    },
    {
      "cve": "CVE-2009-3228",
      "cwe": {
        "id": "CWE-401",
        "name": "Missing Release of Memory after Effective Lifetime"
      },
      "discovery_date": "2009-09-03T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "520990"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The tc_fill_tclass function in net/sched/sch_api.c in the tc subsystem in the Linux kernel 2.4.x before 2.4.37.6 and 2.6.x before 2.6.31-rc9 does not initialize certain (1) tcm__pad1 and (2) tcm__pad2 structure members, which might allow local users to obtain sensitive information from kernel memory via unspecified vectors.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: tc: uninitialised kernel memory leak",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3228"
        },
        {
          "category": "external",
          "summary": "RHBZ#520990",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=520990"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3228",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3228"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3228",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3228"
        }
      ],
      "release_date": "2009-09-02T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T18:21:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1540"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: tc: uninitialised kernel memory leak"
    },
    {
      "cve": "CVE-2009-3547",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2009-10-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "530490"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Multiple race conditions in fs/pipe.c in the Linux kernel before 2.6.32-rc6 allow local users to cause a denial of service (NULL pointer dereference and system crash) or gain privileges by attempting to open an anonymous pipe via a /proc/*/fd/ pathname.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: fs: pipe.c null pointer dereference",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3547"
        },
        {
          "category": "external",
          "summary": "RHBZ#530490",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=530490"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3547",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3547"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3547",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3547"
        }
      ],
      "release_date": "2009-10-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T18:21:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1540"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: fs: pipe.c null pointer dereference"
    },
    {
      "cve": "CVE-2009-3612",
      "discovery_date": "2009-10-14T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "528868"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The tcf_fill_node function in net/sched/cls_api.c in the netlink subsystem in the Linux kernel 2.6.x before 2.6.32-rc5, and 2.4.37.6 and earlier, does not initialize a certain tcm__pad2 structure member, which might allow local users to obtain sensitive information from kernel memory via unspecified vectors.  NOTE: this issue exists because of an incomplete fix for CVE-2005-4881.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: tcf_fill_node() infoleak due to typo in 9ef1d4c7",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is not planned to be fixed in Red Hat Enterprise Linux 3 due to this product being in Production 3 of its maintenance life-cycle, where only qualified security errata of important or critical impact are addressed.\n\nFor further information about the Errata Support Policy, visit: https://access.redhat.com/support/policy/updates/errata/",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3612"
        },
        {
          "category": "external",
          "summary": "RHBZ#528868",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=528868"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3612",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3612"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3612",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3612"
        }
      ],
      "release_date": "2009-10-08T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T18:21:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1540"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: tcf_fill_node() infoleak due to typo in 9ef1d4c7"
    },
    {
      "cve": "CVE-2009-3613",
      "discovery_date": "2009-10-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "529137"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The swiotlb functionality in the r8169 driver in drivers/net/r8169.c in the Linux kernel before 2.6.27.22 allows remote attackers to cause a denial of service (IOMMU space exhaustion and system crash) by using jumbo frames for a large amount of network traffic, as demonstrated by a flood ping.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: flood ping cause out-of-iommu error and panic when mtu larger than 1500",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3613"
        },
        {
          "category": "external",
          "summary": "RHBZ#529137",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529137"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3613",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3613"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3613",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3613"
        }
      ],
      "release_date": "2007-11-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T18:21:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1540"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: flood ping cause out-of-iommu error and panic when mtu larger than 1500"
    },
    {
      "cve": "CVE-2009-3620",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2009-10-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "529597"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The ATI Rage 128 (aka r128) driver in the Linux kernel before 2.6.31-git11 does not properly verify Concurrent Command Engine (CCE) state initialization, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly gain privileges via unspecified ioctl calls.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: r128 IOCTL NULL pointer dereferences when CCE state is uninitialised",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3620"
        },
        {
          "category": "external",
          "summary": "RHBZ#529597",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529597"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3620",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3620"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3620",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3620"
        }
      ],
      "release_date": "2009-08-30T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T18:21:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1540"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.9,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: r128 IOCTL NULL pointer dereferences when CCE state is uninitialised"
    },
    {
      "cve": "CVE-2009-3621",
      "discovery_date": "2009-10-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "529626"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "net/unix/af_unix.c in the Linux kernel 2.6.31.4 and earlier allows local users to cause a denial of service (system hang) by creating an abstract-namespace AF_UNIX listening socket, performing a shutdown operation on this socket, and then performing a series of connect operations to this socket.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: AF_UNIX: Fix deadlock on connecting to shutdown socket",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is not planned to be fixed in Red Hat Enterprise Linux 3, due to this product being in Production 3 of its maintenance life-cycle, where only qualified security errata of important or critical impact are addressed.\n\nFor further information about Errata Support Policy, visit: https://access.redhat.com/support/policy/updates/errata/",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3621"
        },
        {
          "category": "external",
          "summary": "RHBZ#529626",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529626"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3621",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3621"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3621",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3621"
        }
      ],
      "release_date": "2009-10-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T18:21:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1540"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.9,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: AF_UNIX: Fix deadlock on connecting to shutdown socket"
    }
  ]
}
  RHSA-2010:0882
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated kernel packages that fix several security issues and one bug are\nnow available for Red Hat Enterprise Linux 3 Extended Life Cycle Support\n(ELS).\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues:\n\n* An array index error was found in the gdth driver in the Linux kernel. A\nlocal user could send a specially-crafted IOCTL request that would cause a\ndenial of service or, possibly, privilege escalation. (CVE-2009-3080,\nImportant)\n\n* NULL pointer dereference flaws were found in the r128 driver in the Linux\nkernel. Checks to test if the Concurrent Command Engine state was\ninitialized were missing in private IOCTL functions. An attacker could use\nthese flaws to cause a local denial of service or escalate their\nprivileges. (CVE-2009-3620, Important)\n\n* A flaw was found in the Intel PRO/1000 Linux driver, e1000, in the Linux\nkernel. A remote attacker using packets larger than the MTU could bypass\nthe existing fragment check, resulting in partial, invalid frames being\npassed to the network stack. This flaw could also possibly be used to\ntrigger a remote denial of service. (CVE-2009-4536, Important)\n\n* A use-after-free flaw was found in the tcp_rcv_state_process() function\nin the Linux kernel TCP/IP protocol suite implementation. If a system using\nIPv6 had the IPV6_PKTINFO option set on a listening socket, a remote\nattacker could send an IPv6 packet to that system, causing a kernel panic\n(denial of service). (CVE-2010-1188, Important)\n\n* When an application has a stack overflow, the stack could silently\noverwrite another memory mapped area instead of a segmentation fault\noccurring, which could cause an application to execute arbitrary code,\npossibly leading to privilege escalation. It is known that the X Window\nSystem server can be used to trigger this flaw. (CVE-2010-2240, Important)\n\n* The compat_alloc_user_space() function in the Linux kernel 32/64-bit\ncompatibility layer implementation was missing sanity checks. This function\ncould be abused in other areas of the Linux kernel. On 64-bit systems, a\nlocal, unprivileged user could use this flaw to escalate their privileges.\n(CVE-2010-3081, Important)\n\nRed Hat would like to thank the X.Org security team for reporting the\nCVE-2010-2240 issue, with upstream acknowledging Rafal Wojtczuk as the\noriginal reporter; and Ben Hawkes for reporting the CVE-2010-3081 issue.\n\nThis update also fixes the following bug:\n\n* The RHSA-2009:1550 kernel update introduced a regression that prevented\ncertain custom kernel modules from loading, failing with \"unresolved\nsymbol\" errors. This update corrects this issue, allowing the affected\nmodules to load as expected. (BZ#556909)\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2010:0882",
        "url": "https://access.redhat.com/errata/RHSA-2010:0882"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/kb/docs/DOC-40265",
        "url": "https://access.redhat.com/kb/docs/DOC-40265"
      },
      {
        "category": "external",
        "summary": "http://www.redhat.com/rhel/server/extended_lifecycle_support/",
        "url": "http://www.redhat.com/rhel/server/extended_lifecycle_support/"
      },
      {
        "category": "external",
        "summary": "529597",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529597"
      },
      {
        "category": "external",
        "summary": "539414",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539414"
      },
      {
        "category": "external",
        "summary": "552126",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=552126"
      },
      {
        "category": "external",
        "summary": "556909",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=556909"
      },
      {
        "category": "external",
        "summary": "577711",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=577711"
      },
      {
        "category": "external",
        "summary": "606611",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=606611"
      },
      {
        "category": "external",
        "summary": "634457",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=634457"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0882.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security and bug fix update",
    "tracking": {
      "current_release_date": "2025-10-09T13:22:18+00:00",
      "generator": {
        "date": "2025-10-09T13:22:18+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2010:0882",
      "initial_release_date": "2010-11-12T09:36:00+00:00",
      "revision_history": [
        {
          "date": "2010-11-12T09:36:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2010-11-12T04:36:39+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T13:22:18+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AS (v. 3 ELS)",
                "product": {
                  "name": "Red Hat Enterprise Linux AS (v. 3 ELS)",
                  "product_id": "3AS-ELS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_els:3::as"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux ES (v. 3 ELS)",
                "product": {
                  "name": "Red Hat Enterprise Linux ES (v. 3 ELS)",
                  "product_id": "3ES-ELS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_els:3::es"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-BOOT-0:2.4.21-66.EL.i386",
                "product": {
                  "name": "kernel-BOOT-0:2.4.21-66.EL.i386",
                  "product_id": "kernel-BOOT-0:2.4.21-66.EL.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-BOOT@2.4.21-66.EL?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-doc-0:2.4.21-66.EL.i386",
                "product": {
                  "name": "kernel-doc-0:2.4.21-66.EL.i386",
                  "product_id": "kernel-doc-0:2.4.21-66.EL.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-66.EL?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.4.21-66.EL.i386",
                "product": {
                  "name": "kernel-debuginfo-0:2.4.21-66.EL.i386",
                  "product_id": "kernel-debuginfo-0:2.4.21-66.EL.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-66.EL?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-0:2.4.21-66.EL.i386",
                "product": {
                  "name": "kernel-source-0:2.4.21-66.EL.i386",
                  "product_id": "kernel-source-0:2.4.21-66.EL.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-source@2.4.21-66.EL?arch=i386"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i386"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-unsupported-0:2.4.21-66.EL.i686",
                "product": {
                  "name": "kernel-unsupported-0:2.4.21-66.EL.i686",
                  "product_id": "kernel-unsupported-0:2.4.21-66.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-66.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-hugemem-0:2.4.21-66.EL.i686",
                "product": {
                  "name": "kernel-hugemem-0:2.4.21-66.EL.i686",
                  "product_id": "kernel-hugemem-0:2.4.21-66.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-hugemem@2.4.21-66.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.4.21-66.EL.i686",
                "product": {
                  "name": "kernel-0:2.4.21-66.EL.i686",
                  "product_id": "kernel-0:2.4.21-66.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.4.21-66.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-smp-unsupported-0:2.4.21-66.EL.i686",
                "product": {
                  "name": "kernel-smp-unsupported-0:2.4.21-66.EL.i686",
                  "product_id": "kernel-smp-unsupported-0:2.4.21-66.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-smp-unsupported@2.4.21-66.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.4.21-66.EL.i686",
                "product": {
                  "name": "kernel-debuginfo-0:2.4.21-66.EL.i686",
                  "product_id": "kernel-debuginfo-0:2.4.21-66.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-66.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-smp-0:2.4.21-66.EL.i686",
                "product": {
                  "name": "kernel-smp-0:2.4.21-66.EL.i686",
                  "product_id": "kernel-smp-0:2.4.21-66.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-smp@2.4.21-66.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
                "product": {
                  "name": "kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
                  "product_id": "kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-hugemem-unsupported@2.4.21-66.EL?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-unsupported-0:2.4.21-66.EL.athlon",
                "product": {
                  "name": "kernel-unsupported-0:2.4.21-66.EL.athlon",
                  "product_id": "kernel-unsupported-0:2.4.21-66.EL.athlon",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-66.EL?arch=athlon"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.4.21-66.EL.athlon",
                "product": {
                  "name": "kernel-0:2.4.21-66.EL.athlon",
                  "product_id": "kernel-0:2.4.21-66.EL.athlon",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.4.21-66.EL?arch=athlon"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
                "product": {
                  "name": "kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
                  "product_id": "kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-smp-unsupported@2.4.21-66.EL?arch=athlon"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.4.21-66.EL.athlon",
                "product": {
                  "name": "kernel-debuginfo-0:2.4.21-66.EL.athlon",
                  "product_id": "kernel-debuginfo-0:2.4.21-66.EL.athlon",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-66.EL?arch=athlon"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-smp-0:2.4.21-66.EL.athlon",
                "product": {
                  "name": "kernel-smp-0:2.4.21-66.EL.athlon",
                  "product_id": "kernel-smp-0:2.4.21-66.EL.athlon",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-smp@2.4.21-66.EL?arch=athlon"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "athlon"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:2.4.21-66.EL.src",
                "product": {
                  "name": "kernel-0:2.4.21-66.EL.src",
                  "product_id": "kernel-0:2.4.21-66.EL.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.4.21-66.EL?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-66.EL.athlon as a component of Red Hat Enterprise Linux AS (v. 3 ELS)",
          "product_id": "3AS-ELS:kernel-0:2.4.21-66.EL.athlon"
        },
        "product_reference": "kernel-0:2.4.21-66.EL.athlon",
        "relates_to_product_reference": "3AS-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)",
          "product_id": "3AS-ELS:kernel-0:2.4.21-66.EL.i686"
        },
        "product_reference": "kernel-0:2.4.21-66.EL.i686",
        "relates_to_product_reference": "3AS-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-66.EL.src as a component of Red Hat Enterprise Linux AS (v. 3 ELS)",
          "product_id": "3AS-ELS:kernel-0:2.4.21-66.EL.src"
        },
        "product_reference": "kernel-0:2.4.21-66.EL.src",
        "relates_to_product_reference": "3AS-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-BOOT-0:2.4.21-66.EL.i386 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)",
          "product_id": "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386"
        },
        "product_reference": "kernel-BOOT-0:2.4.21-66.EL.i386",
        "relates_to_product_reference": "3AS-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-66.EL.athlon as a component of Red Hat Enterprise Linux AS (v. 3 ELS)",
          "product_id": "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-66.EL.athlon",
        "relates_to_product_reference": "3AS-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-66.EL.i386 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)",
          "product_id": "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-66.EL.i386",
        "relates_to_product_reference": "3AS-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)",
          "product_id": "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-66.EL.i686",
        "relates_to_product_reference": "3AS-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.4.21-66.EL.i386 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)",
          "product_id": "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386"
        },
        "product_reference": "kernel-doc-0:2.4.21-66.EL.i386",
        "relates_to_product_reference": "3AS-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)",
          "product_id": "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686"
        },
        "product_reference": "kernel-hugemem-0:2.4.21-66.EL.i686",
        "relates_to_product_reference": "3AS-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-unsupported-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)",
          "product_id": "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686"
        },
        "product_reference": "kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
        "relates_to_product_reference": "3AS-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.4.21-66.EL.athlon as a component of Red Hat Enterprise Linux AS (v. 3 ELS)",
          "product_id": "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon"
        },
        "product_reference": "kernel-smp-0:2.4.21-66.EL.athlon",
        "relates_to_product_reference": "3AS-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)",
          "product_id": "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686"
        },
        "product_reference": "kernel-smp-0:2.4.21-66.EL.i686",
        "relates_to_product_reference": "3AS-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-unsupported-0:2.4.21-66.EL.athlon as a component of Red Hat Enterprise Linux AS (v. 3 ELS)",
          "product_id": "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon"
        },
        "product_reference": "kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
        "relates_to_product_reference": "3AS-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-unsupported-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)",
          "product_id": "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686"
        },
        "product_reference": "kernel-smp-unsupported-0:2.4.21-66.EL.i686",
        "relates_to_product_reference": "3AS-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-0:2.4.21-66.EL.i386 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)",
          "product_id": "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386"
        },
        "product_reference": "kernel-source-0:2.4.21-66.EL.i386",
        "relates_to_product_reference": "3AS-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-66.EL.athlon as a component of Red Hat Enterprise Linux AS (v. 3 ELS)",
          "product_id": "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-66.EL.athlon",
        "relates_to_product_reference": "3AS-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)",
          "product_id": "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-66.EL.i686",
        "relates_to_product_reference": "3AS-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-66.EL.athlon as a component of Red Hat Enterprise Linux ES (v. 3 ELS)",
          "product_id": "3ES-ELS:kernel-0:2.4.21-66.EL.athlon"
        },
        "product_reference": "kernel-0:2.4.21-66.EL.athlon",
        "relates_to_product_reference": "3ES-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)",
          "product_id": "3ES-ELS:kernel-0:2.4.21-66.EL.i686"
        },
        "product_reference": "kernel-0:2.4.21-66.EL.i686",
        "relates_to_product_reference": "3ES-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-66.EL.src as a component of Red Hat Enterprise Linux ES (v. 3 ELS)",
          "product_id": "3ES-ELS:kernel-0:2.4.21-66.EL.src"
        },
        "product_reference": "kernel-0:2.4.21-66.EL.src",
        "relates_to_product_reference": "3ES-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-BOOT-0:2.4.21-66.EL.i386 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)",
          "product_id": "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386"
        },
        "product_reference": "kernel-BOOT-0:2.4.21-66.EL.i386",
        "relates_to_product_reference": "3ES-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-66.EL.athlon as a component of Red Hat Enterprise Linux ES (v. 3 ELS)",
          "product_id": "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-66.EL.athlon",
        "relates_to_product_reference": "3ES-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-66.EL.i386 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)",
          "product_id": "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-66.EL.i386",
        "relates_to_product_reference": "3ES-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)",
          "product_id": "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-66.EL.i686",
        "relates_to_product_reference": "3ES-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.4.21-66.EL.i386 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)",
          "product_id": "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386"
        },
        "product_reference": "kernel-doc-0:2.4.21-66.EL.i386",
        "relates_to_product_reference": "3ES-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)",
          "product_id": "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686"
        },
        "product_reference": "kernel-hugemem-0:2.4.21-66.EL.i686",
        "relates_to_product_reference": "3ES-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-unsupported-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)",
          "product_id": "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686"
        },
        "product_reference": "kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
        "relates_to_product_reference": "3ES-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.4.21-66.EL.athlon as a component of Red Hat Enterprise Linux ES (v. 3 ELS)",
          "product_id": "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon"
        },
        "product_reference": "kernel-smp-0:2.4.21-66.EL.athlon",
        "relates_to_product_reference": "3ES-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)",
          "product_id": "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686"
        },
        "product_reference": "kernel-smp-0:2.4.21-66.EL.i686",
        "relates_to_product_reference": "3ES-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-unsupported-0:2.4.21-66.EL.athlon as a component of Red Hat Enterprise Linux ES (v. 3 ELS)",
          "product_id": "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon"
        },
        "product_reference": "kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
        "relates_to_product_reference": "3ES-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-unsupported-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)",
          "product_id": "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686"
        },
        "product_reference": "kernel-smp-unsupported-0:2.4.21-66.EL.i686",
        "relates_to_product_reference": "3ES-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-0:2.4.21-66.EL.i386 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)",
          "product_id": "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386"
        },
        "product_reference": "kernel-source-0:2.4.21-66.EL.i386",
        "relates_to_product_reference": "3ES-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-66.EL.athlon as a component of Red Hat Enterprise Linux ES (v. 3 ELS)",
          "product_id": "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-66.EL.athlon",
        "relates_to_product_reference": "3ES-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)",
          "product_id": "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-66.EL.i686",
        "relates_to_product_reference": "3ES-ELS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2009-3080",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2009-11-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "539414"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Array index error in the gdth_read_event function in drivers/scsi/gdth.c in the Linux kernel before 2.6.32-rc8 allows local users to cause a denial of service or possibly gain privileges via a negative event index in an IOCTL request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: gdth: Prevent negative offsets in ioctl",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "3AS-ELS:kernel-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-0:2.4.21-66.EL.src",
          "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
          "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
          "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386",
          "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386",
          "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-0:2.4.21-66.EL.src",
          "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
          "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
          "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386",
          "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386",
          "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3080"
        },
        {
          "category": "external",
          "summary": "RHBZ#539414",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539414"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3080",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3080"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3080",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3080"
        }
      ],
      "release_date": "2009-11-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-11-12T09:36:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
          "product_ids": [
            "3AS-ELS:kernel-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-0:2.4.21-66.EL.src",
            "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-0:2.4.21-66.EL.src",
            "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0882"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "3AS-ELS:kernel-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-0:2.4.21-66.EL.src",
            "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-0:2.4.21-66.EL.src",
            "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: gdth: Prevent negative offsets in ioctl"
    },
    {
      "cve": "CVE-2009-3620",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2009-10-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "529597"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The ATI Rage 128 (aka r128) driver in the Linux kernel before 2.6.31-git11 does not properly verify Concurrent Command Engine (CCE) state initialization, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly gain privileges via unspecified ioctl calls.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: r128 IOCTL NULL pointer dereferences when CCE state is uninitialised",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "3AS-ELS:kernel-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-0:2.4.21-66.EL.src",
          "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
          "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
          "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386",
          "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386",
          "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-0:2.4.21-66.EL.src",
          "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
          "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
          "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386",
          "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386",
          "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3620"
        },
        {
          "category": "external",
          "summary": "RHBZ#529597",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529597"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3620",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3620"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3620",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3620"
        }
      ],
      "release_date": "2009-08-30T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-11-12T09:36:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
          "product_ids": [
            "3AS-ELS:kernel-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-0:2.4.21-66.EL.src",
            "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-0:2.4.21-66.EL.src",
            "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0882"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.9,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "3AS-ELS:kernel-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-0:2.4.21-66.EL.src",
            "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-0:2.4.21-66.EL.src",
            "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: r128 IOCTL NULL pointer dereferences when CCE state is uninitialised"
    },
    {
      "cve": "CVE-2009-4536",
      "discovery_date": "2009-12-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "552126"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel 2.6.32.3 and earlier handles Ethernet frames that exceed the MTU by processing certain trailing payload data as if it were a complete frame, which allows remote attackers to bypass packet filters via a large packet with a crafted payload.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1385.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: e1000 issue reported at 26c3",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "3AS-ELS:kernel-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-0:2.4.21-66.EL.src",
          "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
          "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
          "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386",
          "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386",
          "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-0:2.4.21-66.EL.src",
          "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
          "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
          "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386",
          "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386",
          "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-4536"
        },
        {
          "category": "external",
          "summary": "RHBZ#552126",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=552126"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-4536",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-4536"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4536",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4536"
        }
      ],
      "release_date": "2009-12-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-11-12T09:36:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
          "product_ids": [
            "3AS-ELS:kernel-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-0:2.4.21-66.EL.src",
            "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-0:2.4.21-66.EL.src",
            "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0882"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.8,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:A/AC:L/Au:N/C:N/I:P/A:C",
            "version": "2.0"
          },
          "products": [
            "3AS-ELS:kernel-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-0:2.4.21-66.EL.src",
            "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-0:2.4.21-66.EL.src",
            "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: e1000 issue reported at 26c3"
    },
    {
      "cve": "CVE-2010-1188",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2010-03-29T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "577711"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Use-after-free vulnerability in net/ipv4/tcp_input.c in the Linux kernel 2.6 before 2.6.20, when IPV6_RECVPKTINFO is set on a listening socket, allows remote attackers to cause a denial of service (kernel panic) via a SYN packet while the socket is in a listening (TCP_LISTEN) state, which is not properly handled and causes the skb structure to be freed.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: ipv6: skb is unexpectedly freed",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the version of the Linux kernel as shipped with Red Hat Enterprise MRG, as it was fixed since version v2.6.20-rc6.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "3AS-ELS:kernel-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-0:2.4.21-66.EL.src",
          "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
          "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
          "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386",
          "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386",
          "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-0:2.4.21-66.EL.src",
          "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
          "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
          "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386",
          "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386",
          "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2010-1188"
        },
        {
          "category": "external",
          "summary": "RHBZ#577711",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=577711"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2010-1188",
          "url": "https://www.cve.org/CVERecord?id=CVE-2010-1188"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-1188",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1188"
        }
      ],
      "release_date": "2007-01-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-11-12T09:36:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
          "product_ids": [
            "3AS-ELS:kernel-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-0:2.4.21-66.EL.src",
            "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-0:2.4.21-66.EL.src",
            "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0882"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.8,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "3AS-ELS:kernel-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-0:2.4.21-66.EL.src",
            "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-0:2.4.21-66.EL.src",
            "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: ipv6: skb is unexpectedly freed"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "X.Org security team"
          ]
        },
        {
          "names": [
            "Rafal Wojtczuk"
          ],
          "summary": "Acknowledged by upstream."
        }
      ],
      "cve": "CVE-2010-2240",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2010-06-21T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "606611"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The do_anonymous_page function in mm/memory.c in the Linux kernel before 2.6.27.52, 2.6.32.x before 2.6.32.19, 2.6.34.x before 2.6.34.4, and 2.6.35.x before 2.6.35.2 does not properly separate the stack and the heap, which allows context-dependent attackers to execute arbitrary code by writing to the bottom page of a shared memory segment, as demonstrated by a memory-exhaustion attack against the X.Org X server.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: mm: keep a guard page below a grow-down stack segment",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "3AS-ELS:kernel-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-0:2.4.21-66.EL.src",
          "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
          "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
          "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386",
          "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386",
          "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-0:2.4.21-66.EL.src",
          "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
          "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
          "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386",
          "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386",
          "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2010-2240"
        },
        {
          "category": "external",
          "summary": "RHBZ#606611",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=606611"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2010-2240",
          "url": "https://www.cve.org/CVERecord?id=CVE-2010-2240"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-2240",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2240"
        }
      ],
      "release_date": "2010-08-13T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-11-12T09:36:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
          "product_ids": [
            "3AS-ELS:kernel-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-0:2.4.21-66.EL.src",
            "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-0:2.4.21-66.EL.src",
            "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0882"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "3AS-ELS:kernel-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-0:2.4.21-66.EL.src",
            "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-0:2.4.21-66.EL.src",
            "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: mm: keep a guard page below a grow-down stack segment"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Ben Hawkes"
          ]
        }
      ],
      "cve": "CVE-2010-3081",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2010-09-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "634457"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The compat_alloc_user_space functions in include/asm/compat.h files in the Linux kernel before 2.6.36-rc4-git2 on 64-bit platforms do not properly allocate the userspace memory required for the 32-bit compatibility layer, which allows local users to gain privileges by leveraging the ability of the compat_mc_getsockopt function (aka the MCAST_MSFILTER getsockopt support) to control a certain length value, related to a \"stack pointer underflow\" issue, as exploited in the wild in September 2010.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: 64-bit Compatibility Mode Stack Pointer Underflow",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "More information can be found in this kbase: https://access.redhat.com/kb/docs/DOC-40265.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "3AS-ELS:kernel-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-0:2.4.21-66.EL.src",
          "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
          "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
          "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386",
          "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386",
          "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-0:2.4.21-66.EL.src",
          "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
          "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
          "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386",
          "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386",
          "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2010-3081"
        },
        {
          "category": "external",
          "summary": "RHBZ#634457",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=634457"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3081",
          "url": "https://www.cve.org/CVERecord?id=CVE-2010-3081"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3081",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3081"
        }
      ],
      "release_date": "2010-09-15T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-11-12T09:36:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
          "product_ids": [
            "3AS-ELS:kernel-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-0:2.4.21-66.EL.src",
            "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-0:2.4.21-66.EL.src",
            "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0882"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "3AS-ELS:kernel-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-0:2.4.21-66.EL.src",
            "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-0:2.4.21-66.EL.src",
            "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: 64-bit Compatibility Mode Stack Pointer Underflow"
    }
  ]
}
  rhsa-2009_1670
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated kernel packages that fix multiple security issues and several bugs\nare now available for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nSecurity fixes:\n\n* NULL pointer dereference flaws in the r128 driver. Checks to test if the\nConcurrent Command Engine state was initialized were missing in private\nIOCTL functions. An attacker could use these flaws to cause a local denial\nof service or escalate their privileges. (CVE-2009-3620, Important)\n\n* a NULL pointer dereference flaw in the NFSv4 implementation. Several\nNFSv4 file locking functions failed to check whether a file had been opened\non the server before performing locking operations on it. A local user on a\nsystem with an NFSv4 share mounted could possibly use this flaw to cause a\ndenial of service or escalate their privileges. (CVE-2009-3726, Important)\n\n* a flaw in tcf_fill_node(). A certain data structure in this function was\nnot initialized properly before being copied to user-space. This could lead\nto an information leak. (CVE-2009-3612, Moderate)\n\n* unix_stream_connect() did not check if a UNIX domain socket was in the\nshutdown state. This could lead to a deadlock. A local, unprivileged user\ncould use this flaw to cause a denial of service. (CVE-2009-3621, Moderate)\n\nKnowledgebase DOC-20536 has steps to mitigate NULL pointer dereference\nflaws.\n\nBug fixes:\n\n* frequently changing a CPU between online and offline caused a kernel\npanic on some systems. (BZ#545583)\n\n* for the LSI Logic LSI53C1030 Ultra320 SCSI controller, read commands sent\ncould receive incorrect data, preventing correct data transfer. (BZ#529308)\n\n* pciehp could not detect PCI Express hot plug slots on some systems.\n(BZ#530383)\n\n* soft lockups: inotify race and contention on dcache_lock. (BZ#533822,\nBZ#537019)\n\n* priority ordered lists are now used for threads waiting for a given\nmutex. (BZ#533858)\n\n* a deadlock in DLM could cause GFS2 file systems to lock up. (BZ#533859)\n\n* use-after-free bug in the audit subsystem crashed certain systems when\nrunning usermod. (BZ#533861)\n\n* on certain hardware configurations, a kernel panic when the Broadcom\niSCSI offload driver (bnx2i.ko and cnic.ko) was loaded. (BZ#537014)\n\n* qla2xxx: Enabled MSI-X, and correctly handle the module parameter to\ncontrol it. This improves performance for certain systems. (BZ#537020)\n\n* system crash when reading the cpuaffinity file on a system. (BZ#537346)\n\n* suspend-resume problems on systems with lots of logical CPUs, e.g. BX-EX.\n(BZ#539674)\n\n* off-by-one error in the legacy PCI bus check. (BZ#539675)\n\n* TSC was not made available on systems with multi-clustered APICs. This\ncould cause slow performance for time-sensitive applications. (BZ#539676)\n\n* ACPI: ARB_DISABLE now disabled on platforms that do not need it.\n(BZ#539677)\n\n* fix node to core and power-aware scheduling issues, and a kernel panic\nduring boot on certain AMD Opteron processors. (BZ#539678, BZ#540469,\nBZ#539680, BZ#539682)\n\n* APIC timer interrupt issues on some AMD Opteron systems prevented\nachieving full power savings. (BZ#539681)\n\n* general OProfile support for some newer Intel processors. (BZ#539683)\n\n* system crash during boot when NUMA is enabled on systems using MC and\nkernel-xen. (BZ#539684)\n\n* on some larger systems, performance issues due to a spinlock. (BZ#539685)\n\n* APIC errors when IOMMU is enabled on some AMD Opteron systems.\n(BZ#539687)\n\n* on some AMD Opteron systems, repeatedly taking a CPU offline then online\ncaused a system hang. (BZ#539688)\n\n* I/O page fault errors on some systems. (BZ#539689)\n\n* certain memory configurations could cause the kernel-xen kernel to fail\nto boot on some AMD Opteron systems. (BZ#539690)\n\n* NMI watchdog is now disabled for offline CPUs. (BZ#539691)\n\n* duplicate directories in /proc/acpi/processor/ on BX-EX systems.\n(BZ#539692)\n\n* links did not come up when using bnx2x with certain Broadcom devices.\n(BZ#540381)\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2009:1670",
        "url": "https://access.redhat.com/errata/RHSA-2009:1670"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "http://kbase.redhat.com/faq/docs/DOC-20536",
        "url": "http://kbase.redhat.com/faq/docs/DOC-20536"
      },
      {
        "category": "external",
        "summary": "528868",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=528868"
      },
      {
        "category": "external",
        "summary": "529227",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529227"
      },
      {
        "category": "external",
        "summary": "529308",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529308"
      },
      {
        "category": "external",
        "summary": "529597",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529597"
      },
      {
        "category": "external",
        "summary": "529626",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529626"
      },
      {
        "category": "external",
        "summary": "530383",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=530383"
      },
      {
        "category": "external",
        "summary": "533822",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533822"
      },
      {
        "category": "external",
        "summary": "533858",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533858"
      },
      {
        "category": "external",
        "summary": "533859",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533859"
      },
      {
        "category": "external",
        "summary": "533861",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533861"
      },
      {
        "category": "external",
        "summary": "537014",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=537014"
      },
      {
        "category": "external",
        "summary": "537019",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=537019"
      },
      {
        "category": "external",
        "summary": "537020",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=537020"
      },
      {
        "category": "external",
        "summary": "537346",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=537346"
      },
      {
        "category": "external",
        "summary": "539675",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539675"
      },
      {
        "category": "external",
        "summary": "539676",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539676"
      },
      {
        "category": "external",
        "summary": "539677",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539677"
      },
      {
        "category": "external",
        "summary": "539678",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539678"
      },
      {
        "category": "external",
        "summary": "539680",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539680"
      },
      {
        "category": "external",
        "summary": "539681",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539681"
      },
      {
        "category": "external",
        "summary": "539682",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539682"
      },
      {
        "category": "external",
        "summary": "539683",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539683"
      },
      {
        "category": "external",
        "summary": "539684",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539684"
      },
      {
        "category": "external",
        "summary": "539685",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539685"
      },
      {
        "category": "external",
        "summary": "539687",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539687"
      },
      {
        "category": "external",
        "summary": "539688",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539688"
      },
      {
        "category": "external",
        "summary": "539689",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539689"
      },
      {
        "category": "external",
        "summary": "539690",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539690"
      },
      {
        "category": "external",
        "summary": "539691",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539691"
      },
      {
        "category": "external",
        "summary": "540381",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=540381"
      },
      {
        "category": "external",
        "summary": "540469",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=540469"
      },
      {
        "category": "external",
        "summary": "545583",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=545583"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1670.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security and bug fix update",
    "tracking": {
      "current_release_date": "2024-11-22T03:26:42+00:00",
      "generator": {
        "date": "2024-11-22T03:26:42+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2009:1670",
      "initial_release_date": "2009-12-15T17:05:00+00:00",
      "revision_history": [
        {
          "date": "2009-12-15T17:05:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2009-12-15T12:18:47+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-22T03:26:42+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
                "product": {
                  "name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
                  "product_id": "5Client",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:5::client"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux (v. 5 server)",
                "product": {
                  "name": "Red Hat Enterprise Linux (v. 5 server)",
                  "product_id": "5Server",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:5::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
                "product": {
                  "name": "kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
                  "product_id": "kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-164.9.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-0:2.6.18-164.9.1.el5.i686",
                "product": {
                  "name": "kernel-xen-0:2.6.18-164.9.1.el5.i686",
                  "product_id": "kernel-xen-0:2.6.18-164.9.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-164.9.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-164.9.1.el5.i686",
                "product": {
                  "name": "kernel-devel-0:2.6.18-164.9.1.el5.i686",
                  "product_id": "kernel-devel-0:2.6.18-164.9.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-164.9.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-164.9.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-PAE-0:2.6.18-164.9.1.el5.i686",
                "product": {
                  "name": "kernel-PAE-0:2.6.18-164.9.1.el5.i686",
                  "product_id": "kernel-PAE-0:2.6.18-164.9.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-164.9.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
                "product": {
                  "name": "kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
                  "product_id": "kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-164.9.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
                "product": {
                  "name": "kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
                  "product_id": "kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-164.9.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
                  "product_id": "kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-164.9.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
                "product": {
                  "name": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
                  "product_id": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-164.9.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-164.9.1.el5.i686",
                "product": {
                  "name": "kernel-0:2.6.18-164.9.1.el5.i686",
                  "product_id": "kernel-0:2.6.18-164.9.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-164.9.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-164.9.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
                  "product_id": "kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-164.9.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-164.9.1.el5.i686",
                "product": {
                  "name": "kernel-debug-0:2.6.18-164.9.1.el5.i686",
                  "product_id": "kernel-debug-0:2.6.18-164.9.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-164.9.1.el5?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-164.9.1.el5.i386",
                "product": {
                  "name": "kernel-headers-0:2.6.18-164.9.1.el5.i386",
                  "product_id": "kernel-headers-0:2.6.18-164.9.1.el5.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-164.9.1.el5?arch=i386"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i386"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
                "product": {
                  "name": "kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
                  "product_id": "kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-164.9.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
                "product": {
                  "name": "kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
                  "product_id": "kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-164.9.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-164.9.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
                "product": {
                  "name": "kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
                  "product_id": "kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-164.9.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64",
                "product": {
                  "name": "kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64",
                  "product_id": "kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-164.9.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
                  "product_id": "kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-164.9.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
                "product": {
                  "name": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
                  "product_id": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-164.9.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-164.9.1.el5.x86_64",
                "product": {
                  "name": "kernel-0:2.6.18-164.9.1.el5.x86_64",
                  "product_id": "kernel-0:2.6.18-164.9.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-164.9.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-164.9.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
                  "product_id": "kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-164.9.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
                "product": {
                  "name": "kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
                  "product_id": "kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-164.9.1.el5?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-doc-0:2.6.18-164.9.1.el5.noarch",
                "product": {
                  "name": "kernel-doc-0:2.6.18-164.9.1.el5.noarch",
                  "product_id": "kernel-doc-0:2.6.18-164.9.1.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@2.6.18-164.9.1.el5?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-164.9.1.el5.src",
                "product": {
                  "name": "kernel-0:2.6.18-164.9.1.el5.src",
                  "product_id": "kernel-0:2.6.18-164.9.1.el5.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-164.9.1.el5?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-xen-0:2.6.18-164.9.1.el5.ia64",
                "product": {
                  "name": "kernel-xen-0:2.6.18-164.9.1.el5.ia64",
                  "product_id": "kernel-xen-0:2.6.18-164.9.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-164.9.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-164.9.1.el5.ia64",
                "product": {
                  "name": "kernel-devel-0:2.6.18-164.9.1.el5.ia64",
                  "product_id": "kernel-devel-0:2.6.18-164.9.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-164.9.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-164.9.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-164.9.1.el5.ia64",
                "product": {
                  "name": "kernel-headers-0:2.6.18-164.9.1.el5.ia64",
                  "product_id": "kernel-headers-0:2.6.18-164.9.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-164.9.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
                "product": {
                  "name": "kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
                  "product_id": "kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-164.9.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
                  "product_id": "kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-164.9.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
                "product": {
                  "name": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
                  "product_id": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-164.9.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-164.9.1.el5.ia64",
                "product": {
                  "name": "kernel-0:2.6.18-164.9.1.el5.ia64",
                  "product_id": "kernel-0:2.6.18-164.9.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-164.9.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-164.9.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
                  "product_id": "kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-164.9.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-164.9.1.el5.ia64",
                "product": {
                  "name": "kernel-debug-0:2.6.18-164.9.1.el5.ia64",
                  "product_id": "kernel-debug-0:2.6.18-164.9.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-164.9.1.el5?arch=ia64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ia64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
                "product": {
                  "name": "kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
                  "product_id": "kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-164.9.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-164.9.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
                "product": {
                  "name": "kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
                  "product_id": "kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-164.9.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
                "product": {
                  "name": "kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
                  "product_id": "kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-164.9.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
                  "product_id": "kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-164.9.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
                "product": {
                  "name": "kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
                  "product_id": "kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-164.9.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-164.9.1.el5.ppc64",
                "product": {
                  "name": "kernel-0:2.6.18-164.9.1.el5.ppc64",
                  "product_id": "kernel-0:2.6.18-164.9.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-164.9.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-164.9.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
                "product": {
                  "name": "kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
                  "product_id": "kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-164.9.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
                  "product_id": "kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-164.9.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
                "product": {
                  "name": "kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
                  "product_id": "kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-164.9.1.el5?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-164.9.1.el5.ppc",
                "product": {
                  "name": "kernel-headers-0:2.6.18-164.9.1.el5.ppc",
                  "product_id": "kernel-headers-0:2.6.18-164.9.1.el5.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-164.9.1.el5?arch=ppc"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-164.9.1.el5.s390x",
                "product": {
                  "name": "kernel-devel-0:2.6.18-164.9.1.el5.s390x",
                  "product_id": "kernel-devel-0:2.6.18-164.9.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-164.9.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-164.9.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-164.9.1.el5.s390x",
                "product": {
                  "name": "kernel-headers-0:2.6.18-164.9.1.el5.s390x",
                  "product_id": "kernel-headers-0:2.6.18-164.9.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-164.9.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
                "product": {
                  "name": "kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
                  "product_id": "kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-164.9.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
                  "product_id": "kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-164.9.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
                "product": {
                  "name": "kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
                  "product_id": "kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-164.9.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-164.9.1.el5.s390x",
                "product": {
                  "name": "kernel-0:2.6.18-164.9.1.el5.s390x",
                  "product_id": "kernel-0:2.6.18-164.9.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-164.9.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-164.9.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
                "product": {
                  "name": "kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
                  "product_id": "kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-164.9.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
                  "product_id": "kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-164.9.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-164.9.1.el5.s390x",
                "product": {
                  "name": "kernel-debug-0:2.6.18-164.9.1.el5.s390x",
                  "product_id": "kernel-debug-0:2.6.18-164.9.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-164.9.1.el5?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-0:2.6.18-164.9.1.el5.i686"
        },
        "product_reference": "kernel-0:2.6.18-164.9.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-0:2.6.18-164.9.1.el5.ia64"
        },
        "product_reference": "kernel-0:2.6.18-164.9.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-0:2.6.18-164.9.1.el5.ppc64"
        },
        "product_reference": "kernel-0:2.6.18-164.9.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-0:2.6.18-164.9.1.el5.s390x"
        },
        "product_reference": "kernel-0:2.6.18-164.9.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-164.9.1.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-0:2.6.18-164.9.1.el5.src"
        },
        "product_reference": "kernel-0:2.6.18-164.9.1.el5.src",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-0:2.6.18-164.9.1.el5.x86_64"
        },
        "product_reference": "kernel-0:2.6.18-164.9.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-PAE-0:2.6.18-164.9.1.el5.i686"
        },
        "product_reference": "kernel-PAE-0:2.6.18-164.9.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686"
        },
        "product_reference": "kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686"
        },
        "product_reference": "kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-0:2.6.18-164.9.1.el5.i686"
        },
        "product_reference": "kernel-debug-0:2.6.18-164.9.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ia64"
        },
        "product_reference": "kernel-debug-0:2.6.18-164.9.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ppc64"
        },
        "product_reference": "kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-0:2.6.18-164.9.1.el5.s390x"
        },
        "product_reference": "kernel-debug-0:2.6.18-164.9.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-0:2.6.18-164.9.1.el5.x86_64"
        },
        "product_reference": "kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-devel-0:2.6.18-164.9.1.el5.i686"
        },
        "product_reference": "kernel-devel-0:2.6.18-164.9.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.18-164.9.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-devel-0:2.6.18-164.9.1.el5.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.18-164.9.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-devel-0:2.6.18-164.9.1.el5.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.18-164.9.1.el5.noarch as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-doc-0:2.6.18-164.9.1.el5.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.18-164.9.1.el5.noarch",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-164.9.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-headers-0:2.6.18-164.9.1.el5.i386"
        },
        "product_reference": "kernel-headers-0:2.6.18-164.9.1.el5.i386",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ia64"
        },
        "product_reference": "kernel-headers-0:2.6.18-164.9.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-164.9.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc"
        },
        "product_reference": "kernel-headers-0:2.6.18-164.9.1.el5.ppc",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc64"
        },
        "product_reference": "kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-headers-0:2.6.18-164.9.1.el5.s390x"
        },
        "product_reference": "kernel-headers-0:2.6.18-164.9.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-headers-0:2.6.18-164.9.1.el5.x86_64"
        },
        "product_reference": "kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64"
        },
        "product_reference": "kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.s390x"
        },
        "product_reference": "kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64"
        },
        "product_reference": "kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64"
        },
        "product_reference": "kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-0:2.6.18-164.9.1.el5.i686"
        },
        "product_reference": "kernel-xen-0:2.6.18-164.9.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-0:2.6.18-164.9.1.el5.ia64"
        },
        "product_reference": "kernel-xen-0:2.6.18-164.9.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-0:2.6.18-164.9.1.el5.x86_64"
        },
        "product_reference": "kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-0:2.6.18-164.9.1.el5.i686"
        },
        "product_reference": "kernel-0:2.6.18-164.9.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-0:2.6.18-164.9.1.el5.ia64"
        },
        "product_reference": "kernel-0:2.6.18-164.9.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-0:2.6.18-164.9.1.el5.ppc64"
        },
        "product_reference": "kernel-0:2.6.18-164.9.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-0:2.6.18-164.9.1.el5.s390x"
        },
        "product_reference": "kernel-0:2.6.18-164.9.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-164.9.1.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-0:2.6.18-164.9.1.el5.src"
        },
        "product_reference": "kernel-0:2.6.18-164.9.1.el5.src",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-0:2.6.18-164.9.1.el5.x86_64"
        },
        "product_reference": "kernel-0:2.6.18-164.9.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-PAE-0:2.6.18-164.9.1.el5.i686"
        },
        "product_reference": "kernel-PAE-0:2.6.18-164.9.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686"
        },
        "product_reference": "kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686"
        },
        "product_reference": "kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-0:2.6.18-164.9.1.el5.i686"
        },
        "product_reference": "kernel-debug-0:2.6.18-164.9.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ia64"
        },
        "product_reference": "kernel-debug-0:2.6.18-164.9.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ppc64"
        },
        "product_reference": "kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-0:2.6.18-164.9.1.el5.s390x"
        },
        "product_reference": "kernel-debug-0:2.6.18-164.9.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-0:2.6.18-164.9.1.el5.x86_64"
        },
        "product_reference": "kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-devel-0:2.6.18-164.9.1.el5.i686"
        },
        "product_reference": "kernel-devel-0:2.6.18-164.9.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.18-164.9.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-devel-0:2.6.18-164.9.1.el5.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.18-164.9.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-devel-0:2.6.18-164.9.1.el5.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.18-164.9.1.el5.noarch as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-doc-0:2.6.18-164.9.1.el5.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.18-164.9.1.el5.noarch",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-164.9.1.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-headers-0:2.6.18-164.9.1.el5.i386"
        },
        "product_reference": "kernel-headers-0:2.6.18-164.9.1.el5.i386",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ia64"
        },
        "product_reference": "kernel-headers-0:2.6.18-164.9.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-164.9.1.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc"
        },
        "product_reference": "kernel-headers-0:2.6.18-164.9.1.el5.ppc",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc64"
        },
        "product_reference": "kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-headers-0:2.6.18-164.9.1.el5.s390x"
        },
        "product_reference": "kernel-headers-0:2.6.18-164.9.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-headers-0:2.6.18-164.9.1.el5.x86_64"
        },
        "product_reference": "kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64"
        },
        "product_reference": "kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.s390x"
        },
        "product_reference": "kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64"
        },
        "product_reference": "kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64"
        },
        "product_reference": "kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-0:2.6.18-164.9.1.el5.i686"
        },
        "product_reference": "kernel-xen-0:2.6.18-164.9.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-0:2.6.18-164.9.1.el5.ia64"
        },
        "product_reference": "kernel-xen-0:2.6.18-164.9.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-0:2.6.18-164.9.1.el5.x86_64"
        },
        "product_reference": "kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2009-3612",
      "discovery_date": "2009-10-14T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "528868"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The tcf_fill_node function in net/sched/cls_api.c in the netlink subsystem in the Linux kernel 2.6.x before 2.6.32-rc5, and 2.4.37.6 and earlier, does not initialize a certain tcm__pad2 structure member, which might allow local users to obtain sensitive information from kernel memory via unspecified vectors.  NOTE: this issue exists because of an incomplete fix for CVE-2005-4881.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: tcf_fill_node() infoleak due to typo in 9ef1d4c7",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is not planned to be fixed in Red Hat Enterprise Linux 3 due to this product being in Production 3 of its maintenance life-cycle, where only qualified security errata of important or critical impact are addressed.\n\nFor further information about the Errata Support Policy, visit: https://access.redhat.com/support/policy/updates/errata/",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-0:2.6.18-164.9.1.el5.src",
          "5Client:kernel-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-164.9.1.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-164.9.1.el5.i386",
          "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-xen-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-0:2.6.18-164.9.1.el5.src",
          "5Server:kernel-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-164.9.1.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-164.9.1.el5.i386",
          "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-xen-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3612"
        },
        {
          "category": "external",
          "summary": "RHBZ#528868",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=528868"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3612",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3612"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3612",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3612"
        }
      ],
      "release_date": "2009-10-08T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-12-15T17:05:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.9.1.el5.src",
            "5Client:kernel-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.9.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.9.1.el5.src",
            "5Server:kernel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.9.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1670"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.9.1.el5.src",
            "5Client:kernel-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.9.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.9.1.el5.src",
            "5Server:kernel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.9.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: tcf_fill_node() infoleak due to typo in 9ef1d4c7"
    },
    {
      "cve": "CVE-2009-3620",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2009-10-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "529597"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The ATI Rage 128 (aka r128) driver in the Linux kernel before 2.6.31-git11 does not properly verify Concurrent Command Engine (CCE) state initialization, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly gain privileges via unspecified ioctl calls.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: r128 IOCTL NULL pointer dereferences when CCE state is uninitialised",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-0:2.6.18-164.9.1.el5.src",
          "5Client:kernel-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-164.9.1.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-164.9.1.el5.i386",
          "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-xen-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-0:2.6.18-164.9.1.el5.src",
          "5Server:kernel-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-164.9.1.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-164.9.1.el5.i386",
          "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-xen-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3620"
        },
        {
          "category": "external",
          "summary": "RHBZ#529597",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529597"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3620",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3620"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3620",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3620"
        }
      ],
      "release_date": "2009-08-30T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-12-15T17:05:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.9.1.el5.src",
            "5Client:kernel-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.9.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.9.1.el5.src",
            "5Server:kernel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.9.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1670"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.9,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.9.1.el5.src",
            "5Client:kernel-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.9.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.9.1.el5.src",
            "5Server:kernel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.9.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: r128 IOCTL NULL pointer dereferences when CCE state is uninitialised"
    },
    {
      "cve": "CVE-2009-3621",
      "discovery_date": "2009-10-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "529626"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "net/unix/af_unix.c in the Linux kernel 2.6.31.4 and earlier allows local users to cause a denial of service (system hang) by creating an abstract-namespace AF_UNIX listening socket, performing a shutdown operation on this socket, and then performing a series of connect operations to this socket.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: AF_UNIX: Fix deadlock on connecting to shutdown socket",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is not planned to be fixed in Red Hat Enterprise Linux 3, due to this product being in Production 3 of its maintenance life-cycle, where only qualified security errata of important or critical impact are addressed.\n\nFor further information about Errata Support Policy, visit: https://access.redhat.com/support/policy/updates/errata/",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-0:2.6.18-164.9.1.el5.src",
          "5Client:kernel-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-164.9.1.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-164.9.1.el5.i386",
          "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-xen-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-0:2.6.18-164.9.1.el5.src",
          "5Server:kernel-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-164.9.1.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-164.9.1.el5.i386",
          "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-xen-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3621"
        },
        {
          "category": "external",
          "summary": "RHBZ#529626",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529626"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3621",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3621"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3621",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3621"
        }
      ],
      "release_date": "2009-10-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-12-15T17:05:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.9.1.el5.src",
            "5Client:kernel-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.9.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.9.1.el5.src",
            "5Server:kernel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.9.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1670"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.9,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.9.1.el5.src",
            "5Client:kernel-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.9.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.9.1.el5.src",
            "5Server:kernel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.9.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: AF_UNIX: Fix deadlock on connecting to shutdown socket"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Simon Vallet"
          ]
        }
      ],
      "cve": "CVE-2009-3726",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2009-11-05T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "529227"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The nfs4_proc_lock function in fs/nfs/nfs4proc.c in the NFSv4 client in the Linux kernel before 2.6.31-rc4 allows remote NFS servers to cause a denial of service (NULL pointer dereference and panic) by sending a certain response containing incorrect file attributes, which trigger attempted use of an open file that lacks NFSv4 state.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: nfsv4: kernel panic in nfs4_proc_lock()",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The Linux kernel as shipped with Red Hat Enterprise Linux 3 did not have support for NFSv4, and therefore is not affected by this issue. It was addressed in Red Hat Enterprise Linux 4, 5, and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2010-0474.html, https://rhn.redhat.com/errata/RHSA-2009-1670.html and https://rhn.redhat.com/errata/RHSA-2009-1635.html respectively.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-0:2.6.18-164.9.1.el5.src",
          "5Client:kernel-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-164.9.1.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-164.9.1.el5.i386",
          "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-xen-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-0:2.6.18-164.9.1.el5.src",
          "5Server:kernel-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-164.9.1.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-164.9.1.el5.i386",
          "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-xen-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3726"
        },
        {
          "category": "external",
          "summary": "RHBZ#529227",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529227"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3726",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3726"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3726",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3726"
        }
      ],
      "release_date": "2008-10-22T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-12-15T17:05:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.9.1.el5.src",
            "5Client:kernel-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.9.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.9.1.el5.src",
            "5Server:kernel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.9.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1670"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.9.1.el5.src",
            "5Client:kernel-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.9.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.9.1.el5.src",
            "5Server:kernel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.9.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: nfsv4: kernel panic in nfs4_proc_lock()"
    }
  ]
}
  rhsa-2009_1671
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated kernel packages that fix multiple security issues and several bugs\nare now available for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues:\n\n* a flaw was found in the Realtek r8169 Ethernet driver in the Linux\nkernel. pci_unmap_single() presented a memory leak that could lead to IOMMU\nspace exhaustion and a system crash. An attacker on the local network could\ntrigger this flaw by using jumbo frames for large amounts of network\ntraffic. (CVE-2009-3613, Important)\n\n* NULL pointer dereference flaws were found in the r128 driver in the Linux\nkernel. Checks to test if the Concurrent Command Engine state was\ninitialized were missing in private IOCTL functions. An attacker could use\nthese flaws to cause a local denial of service or escalate their\nprivileges. (CVE-2009-3620, Important)\n\n* an information leak was found in the Linux kernel. On AMD64 systems,\n32-bit processes could access and read certain 64-bit registers by\ntemporarily switching themselves to 64-bit mode. (CVE-2009-2910, Moderate)\n\n* the unix_stream_connect() function in the Linux kernel did not check if a\nUNIX domain socket was in the shutdown state. This could lead to a\ndeadlock. A local, unprivileged user could use this flaw to cause a denial\nof service. (CVE-2009-3621, Moderate)\n\nThis update also fixes the following bugs:\n\n* an iptables rule with the recent module and a hit count value greater\nthan the ip_pkt_list_tot parameter (the default is 20), did not have any\neffect over packets, as the hit count could not be reached. (BZ#529306)\n\n* in environments that use dual-controller storage devices with the cciss\ndriver, Device-Mapper Multipath maps could not be detected and configured,\ndue to the cciss driver not exporting the bus attribute via sysfs. This\nattribute is now exported. (BZ#529309)\n\n* the kernel crashed with a divide error when a certain joystick was\nattached. (BZ#532027)\n\n* a bug in the mptctl_do_mpt_command() function in the mpt driver may have\nresulted in crashes during boot on i386 systems with certain adapters using\nthe mpt driver, and also running the hugemem kernel. (BZ#533798)\n\n* on certain hardware, the igb driver was unable to detect link statuses\ncorrectly. This may have caused problems for network bonding, such as\nfailover not occurring. (BZ#534105)\n\n* the RHSA-2009:1024 update introduced a regression. After updating to Red\nHat Enterprise Linux 4.8 and rebooting, network links often failed to be\nbrought up for interfaces using the forcedeth driver. \"no link during\ninitialization\" messages may have been logged. (BZ#534112)\n\n* the RHSA-2009:1024 update introduced a second regression. On certain\nsystems, PS/2 keyboards failed to work. (BZ#537344)\n\n* a bug in checksum offload calculations could have crashed the bnx2x\nfirmware when the iptable_nat module was loaded, causing network traffic\nto stop. (BZ#537013)\n\n* a check has been added to the IPv4 code to make sure that the routing\ntable data structure, rt, is not NULL, to help prevent future bugs in\nfunctions that call ip_append_data() from being exploitable. (BZ#537016)\n\n* possible kernel pointer dereferences on systems with several NFS mounts\n(a mixture of \"-o lock\" and \"-o nolock\"), which in rare cases may have\ncaused a system crash, have been resolved. (BZ#537017)\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2009:1671",
        "url": "https://access.redhat.com/errata/RHSA-2009:1671"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "526788",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=526788"
      },
      {
        "category": "external",
        "summary": "529137",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529137"
      },
      {
        "category": "external",
        "summary": "529306",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529306"
      },
      {
        "category": "external",
        "summary": "529309",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529309"
      },
      {
        "category": "external",
        "summary": "529597",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529597"
      },
      {
        "category": "external",
        "summary": "529626",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529626"
      },
      {
        "category": "external",
        "summary": "532027",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=532027"
      },
      {
        "category": "external",
        "summary": "533798",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533798"
      },
      {
        "category": "external",
        "summary": "534105",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=534105"
      },
      {
        "category": "external",
        "summary": "534112",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=534112"
      },
      {
        "category": "external",
        "summary": "537013",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=537013"
      },
      {
        "category": "external",
        "summary": "537016",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=537016"
      },
      {
        "category": "external",
        "summary": "537017",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=537017"
      },
      {
        "category": "external",
        "summary": "537344",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=537344"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1671.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security and bug fix update",
    "tracking": {
      "current_release_date": "2024-11-22T03:26:47+00:00",
      "generator": {
        "date": "2024-11-22T03:26:47+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2009:1671",
      "initial_release_date": "2009-12-15T17:12:00+00:00",
      "revision_history": [
        {
          "date": "2009-12-15T17:12:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2009-12-15T12:18:22+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-22T03:26:47+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AS version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux AS version 4",
                  "product_id": "4AS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::as"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Desktop version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux Desktop version 4",
                  "product_id": "4Desktop",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux ES version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux ES version 4",
                  "product_id": "4ES",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::es"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux WS version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux WS version 4",
                  "product_id": "4WS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
                  "product_id": "kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.18.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
                "product": {
                  "name": "kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
                  "product_id": "kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-hugemem@2.6.9-89.0.18.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-89.0.18.EL.i686",
                "product": {
                  "name": "kernel-devel-0:2.6.9-89.0.18.EL.i686",
                  "product_id": "kernel-devel-0:2.6.9-89.0.18.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.18.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
                "product": {
                  "name": "kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
                  "product_id": "kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-89.0.18.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
                "product": {
                  "name": "kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
                  "product_id": "kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-hugemem-devel@2.6.9-89.0.18.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
                "product": {
                  "name": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
                  "product_id": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xenU-devel@2.6.9-89.0.18.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-89.0.18.EL.i686",
                "product": {
                  "name": "kernel-0:2.6.9-89.0.18.EL.i686",
                  "product_id": "kernel-0:2.6.9-89.0.18.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.18.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-smp-0:2.6.9-89.0.18.EL.i686",
                "product": {
                  "name": "kernel-smp-0:2.6.9-89.0.18.EL.i686",
                  "product_id": "kernel-smp-0:2.6.9-89.0.18.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-smp@2.6.9-89.0.18.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xenU-0:2.6.9-89.0.18.EL.i686",
                "product": {
                  "name": "kernel-xenU-0:2.6.9-89.0.18.EL.i686",
                  "product_id": "kernel-xenU-0:2.6.9-89.0.18.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xenU@2.6.9-89.0.18.EL?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
                  "product_id": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.18.EL?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
                "product": {
                  "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
                  "product_id": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-89.0.18.EL?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-89.0.18.EL.ia64",
                "product": {
                  "name": "kernel-devel-0:2.6.9-89.0.18.EL.ia64",
                  "product_id": "kernel-devel-0:2.6.9-89.0.18.EL.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.18.EL?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-89.0.18.EL.ia64",
                "product": {
                  "name": "kernel-0:2.6.9-89.0.18.EL.ia64",
                  "product_id": "kernel-0:2.6.9-89.0.18.EL.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.18.EL?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
                "product": {
                  "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
                  "product_id": "kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-89.0.18.EL?arch=ia64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ia64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
                  "product_id": "kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.18.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
                "product": {
                  "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
                  "product_id": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-89.0.18.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
                "product": {
                  "name": "kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
                  "product_id": "kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.18.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
                "product": {
                  "name": "kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
                  "product_id": "kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-89.0.18.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
                "product": {
                  "name": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
                  "product_id": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xenU-devel@2.6.9-89.0.18.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-89.0.18.EL.x86_64",
                "product": {
                  "name": "kernel-0:2.6.9-89.0.18.EL.x86_64",
                  "product_id": "kernel-0:2.6.9-89.0.18.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.18.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
                "product": {
                  "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
                  "product_id": "kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-89.0.18.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
                "product": {
                  "name": "kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
                  "product_id": "kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-smp@2.6.9-89.0.18.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
                "product": {
                  "name": "kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
                  "product_id": "kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xenU@2.6.9-89.0.18.EL?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-89.0.18.EL.src",
                "product": {
                  "name": "kernel-0:2.6.9-89.0.18.EL.src",
                  "product_id": "kernel-0:2.6.9-89.0.18.EL.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.18.EL?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-doc-0:2.6.9-89.0.18.EL.noarch",
                "product": {
                  "name": "kernel-doc-0:2.6.9-89.0.18.EL.noarch",
                  "product_id": "kernel-doc-0:2.6.9-89.0.18.EL.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@2.6.9-89.0.18.EL?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
                  "product_id": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.18.EL?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
                "product": {
                  "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
                  "product_id": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-89.0.18.EL?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
                "product": {
                  "name": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
                  "product_id": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.18.EL?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-89.0.18.EL.ppc64",
                "product": {
                  "name": "kernel-0:2.6.9-89.0.18.EL.ppc64",
                  "product_id": "kernel-0:2.6.9-89.0.18.EL.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.18.EL?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
                "product": {
                  "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
                  "product_id": "kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-89.0.18.EL?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
                  "product_id": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.18.EL?arch=ppc64iseries"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
                "product": {
                  "name": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
                  "product_id": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.18.EL?arch=ppc64iseries"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
                "product": {
                  "name": "kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
                  "product_id": "kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.18.EL?arch=ppc64iseries"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64iseries"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
                  "product_id": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.18.EL?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-89.0.18.EL.s390x",
                "product": {
                  "name": "kernel-devel-0:2.6.9-89.0.18.EL.s390x",
                  "product_id": "kernel-devel-0:2.6.9-89.0.18.EL.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.18.EL?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-89.0.18.EL.s390x",
                "product": {
                  "name": "kernel-0:2.6.9-89.0.18.EL.s390x",
                  "product_id": "kernel-0:2.6.9-89.0.18.EL.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.18.EL?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
                  "product_id": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.18.EL?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-89.0.18.EL.s390",
                "product": {
                  "name": "kernel-devel-0:2.6.9-89.0.18.EL.s390",
                  "product_id": "kernel-devel-0:2.6.9-89.0.18.EL.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.18.EL?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-89.0.18.EL.s390",
                "product": {
                  "name": "kernel-0:2.6.9-89.0.18.EL.s390",
                  "product_id": "kernel-0:2.6.9-89.0.18.EL.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.18.EL?arch=s390"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.s390 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-89.0.18.EL.s390"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.s390",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.s390x as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-89.0.18.EL.s390x"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.s390x",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.src as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-89.0.18.EL.src"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.src",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.s390 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.s390",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.s390x as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.s390x",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.9-89.0.18.EL.noarch as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-doc-0:2.6.9-89.0.18.EL.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.9-89.0.18.EL.noarch",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-smp-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-smp-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-xenU-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64iseries"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.s390",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390x"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.s390x",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.src as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-89.0.18.EL.src"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.src",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.s390",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.s390x",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.9-89.0.18.EL.noarch as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-doc-0:2.6.9-89.0.18.EL.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.9-89.0.18.EL.noarch",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-hugemem-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-smp-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-xenU-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64iseries"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.s390 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-89.0.18.EL.s390"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.s390",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.s390x as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-89.0.18.EL.s390x"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.s390x",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.src as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-89.0.18.EL.src"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.src",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.s390 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.s390",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.s390x as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.s390x",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.9-89.0.18.EL.noarch as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-doc-0:2.6.9-89.0.18.EL.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.9-89.0.18.EL.noarch",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-hugemem-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-smp-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-smp-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-smp-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-xenU-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.s390 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-89.0.18.EL.s390"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.s390",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.s390x as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-89.0.18.EL.s390x"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.s390x",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.src as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-89.0.18.EL.src"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.src",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.s390 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.s390",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.s390x as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.s390x",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.9-89.0.18.EL.noarch as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-doc-0:2.6.9-89.0.18.EL.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.9-89.0.18.EL.noarch",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-smp-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-smp-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-xenU-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4WS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2009-2910",
      "discovery_date": "2009-10-01T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "526788"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "arch/x86/ia32/ia32entry.S in the Linux kernel before 2.6.31.4 on the x86_64 platform does not clear certain kernel registers before a return to user mode, which allows local users to read register values from an earlier process by switching an ia32 process to 64-bit mode.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: x86_64 32 bit process register leak",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is not planned to be fixed in Red Hat Enterprise Linux 3, due to this product being in Production 3 of its maintenance life-cycle, where only qualified security errata of important and critical impact are addressed.\n\nFor further information about Errata Support Policy, visit: https://access.redhat.com/support/policy/updates/errata/",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:kernel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4AS:kernel-0:2.6.9-89.0.18.EL.s390",
          "4AS:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4AS:kernel-0:2.6.9-89.0.18.EL.src",
          "4AS:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4AS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.src",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4Desktop:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4ES:kernel-0:2.6.9-89.0.18.EL.s390",
          "4ES:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4ES:kernel-0:2.6.9-89.0.18.EL.src",
          "4ES:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4ES:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4WS:kernel-0:2.6.9-89.0.18.EL.s390",
          "4WS:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4WS:kernel-0:2.6.9-89.0.18.EL.src",
          "4WS:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4WS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-2910"
        },
        {
          "category": "external",
          "summary": "RHBZ#526788",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=526788"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2910",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-2910"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2910",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2910"
        }
      ],
      "release_date": "2009-10-01T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-12-15T17:12:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-0:2.6.9-89.0.18.EL.src",
            "4AS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.src",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-0:2.6.9-89.0.18.EL.src",
            "4ES:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-0:2.6.9-89.0.18.EL.src",
            "4WS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1671"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "products": [
            "4AS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-0:2.6.9-89.0.18.EL.src",
            "4AS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.src",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-0:2.6.9-89.0.18.EL.src",
            "4ES:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-0:2.6.9-89.0.18.EL.src",
            "4WS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: x86_64 32 bit process register leak"
    },
    {
      "cve": "CVE-2009-3613",
      "discovery_date": "2009-10-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "529137"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The swiotlb functionality in the r8169 driver in drivers/net/r8169.c in the Linux kernel before 2.6.27.22 allows remote attackers to cause a denial of service (IOMMU space exhaustion and system crash) by using jumbo frames for a large amount of network traffic, as demonstrated by a flood ping.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: flood ping cause out-of-iommu error and panic when mtu larger than 1500",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:kernel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4AS:kernel-0:2.6.9-89.0.18.EL.s390",
          "4AS:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4AS:kernel-0:2.6.9-89.0.18.EL.src",
          "4AS:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4AS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.src",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4Desktop:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4ES:kernel-0:2.6.9-89.0.18.EL.s390",
          "4ES:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4ES:kernel-0:2.6.9-89.0.18.EL.src",
          "4ES:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4ES:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4WS:kernel-0:2.6.9-89.0.18.EL.s390",
          "4WS:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4WS:kernel-0:2.6.9-89.0.18.EL.src",
          "4WS:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4WS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3613"
        },
        {
          "category": "external",
          "summary": "RHBZ#529137",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529137"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3613",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3613"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3613",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3613"
        }
      ],
      "release_date": "2007-11-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-12-15T17:12:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-0:2.6.9-89.0.18.EL.src",
            "4AS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.src",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-0:2.6.9-89.0.18.EL.src",
            "4ES:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-0:2.6.9-89.0.18.EL.src",
            "4WS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1671"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "4AS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-0:2.6.9-89.0.18.EL.src",
            "4AS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.src",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-0:2.6.9-89.0.18.EL.src",
            "4ES:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-0:2.6.9-89.0.18.EL.src",
            "4WS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: flood ping cause out-of-iommu error and panic when mtu larger than 1500"
    },
    {
      "cve": "CVE-2009-3620",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2009-10-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "529597"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The ATI Rage 128 (aka r128) driver in the Linux kernel before 2.6.31-git11 does not properly verify Concurrent Command Engine (CCE) state initialization, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly gain privileges via unspecified ioctl calls.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: r128 IOCTL NULL pointer dereferences when CCE state is uninitialised",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:kernel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4AS:kernel-0:2.6.9-89.0.18.EL.s390",
          "4AS:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4AS:kernel-0:2.6.9-89.0.18.EL.src",
          "4AS:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4AS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.src",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4Desktop:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4ES:kernel-0:2.6.9-89.0.18.EL.s390",
          "4ES:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4ES:kernel-0:2.6.9-89.0.18.EL.src",
          "4ES:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4ES:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4WS:kernel-0:2.6.9-89.0.18.EL.s390",
          "4WS:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4WS:kernel-0:2.6.9-89.0.18.EL.src",
          "4WS:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4WS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3620"
        },
        {
          "category": "external",
          "summary": "RHBZ#529597",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529597"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3620",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3620"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3620",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3620"
        }
      ],
      "release_date": "2009-08-30T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-12-15T17:12:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-0:2.6.9-89.0.18.EL.src",
            "4AS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.src",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-0:2.6.9-89.0.18.EL.src",
            "4ES:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-0:2.6.9-89.0.18.EL.src",
            "4WS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1671"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.9,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "4AS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-0:2.6.9-89.0.18.EL.src",
            "4AS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.src",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-0:2.6.9-89.0.18.EL.src",
            "4ES:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-0:2.6.9-89.0.18.EL.src",
            "4WS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: r128 IOCTL NULL pointer dereferences when CCE state is uninitialised"
    },
    {
      "cve": "CVE-2009-3621",
      "discovery_date": "2009-10-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "529626"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "net/unix/af_unix.c in the Linux kernel 2.6.31.4 and earlier allows local users to cause a denial of service (system hang) by creating an abstract-namespace AF_UNIX listening socket, performing a shutdown operation on this socket, and then performing a series of connect operations to this socket.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: AF_UNIX: Fix deadlock on connecting to shutdown socket",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is not planned to be fixed in Red Hat Enterprise Linux 3, due to this product being in Production 3 of its maintenance life-cycle, where only qualified security errata of important or critical impact are addressed.\n\nFor further information about Errata Support Policy, visit: https://access.redhat.com/support/policy/updates/errata/",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:kernel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4AS:kernel-0:2.6.9-89.0.18.EL.s390",
          "4AS:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4AS:kernel-0:2.6.9-89.0.18.EL.src",
          "4AS:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4AS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.src",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4Desktop:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4ES:kernel-0:2.6.9-89.0.18.EL.s390",
          "4ES:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4ES:kernel-0:2.6.9-89.0.18.EL.src",
          "4ES:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4ES:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4WS:kernel-0:2.6.9-89.0.18.EL.s390",
          "4WS:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4WS:kernel-0:2.6.9-89.0.18.EL.src",
          "4WS:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4WS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3621"
        },
        {
          "category": "external",
          "summary": "RHBZ#529626",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529626"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3621",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3621"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3621",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3621"
        }
      ],
      "release_date": "2009-10-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-12-15T17:12:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-0:2.6.9-89.0.18.EL.src",
            "4AS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.src",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-0:2.6.9-89.0.18.EL.src",
            "4ES:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-0:2.6.9-89.0.18.EL.src",
            "4WS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1671"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.9,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "4AS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-0:2.6.9-89.0.18.EL.src",
            "4AS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.src",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-0:2.6.9-89.0.18.EL.src",
            "4ES:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-0:2.6.9-89.0.18.EL.src",
            "4WS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: AF_UNIX: Fix deadlock on connecting to shutdown socket"
    }
  ]
}
  rhsa-2009:1670
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated kernel packages that fix multiple security issues and several bugs\nare now available for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nSecurity fixes:\n\n* NULL pointer dereference flaws in the r128 driver. Checks to test if the\nConcurrent Command Engine state was initialized were missing in private\nIOCTL functions. An attacker could use these flaws to cause a local denial\nof service or escalate their privileges. (CVE-2009-3620, Important)\n\n* a NULL pointer dereference flaw in the NFSv4 implementation. Several\nNFSv4 file locking functions failed to check whether a file had been opened\non the server before performing locking operations on it. A local user on a\nsystem with an NFSv4 share mounted could possibly use this flaw to cause a\ndenial of service or escalate their privileges. (CVE-2009-3726, Important)\n\n* a flaw in tcf_fill_node(). A certain data structure in this function was\nnot initialized properly before being copied to user-space. This could lead\nto an information leak. (CVE-2009-3612, Moderate)\n\n* unix_stream_connect() did not check if a UNIX domain socket was in the\nshutdown state. This could lead to a deadlock. A local, unprivileged user\ncould use this flaw to cause a denial of service. (CVE-2009-3621, Moderate)\n\nKnowledgebase DOC-20536 has steps to mitigate NULL pointer dereference\nflaws.\n\nBug fixes:\n\n* frequently changing a CPU between online and offline caused a kernel\npanic on some systems. (BZ#545583)\n\n* for the LSI Logic LSI53C1030 Ultra320 SCSI controller, read commands sent\ncould receive incorrect data, preventing correct data transfer. (BZ#529308)\n\n* pciehp could not detect PCI Express hot plug slots on some systems.\n(BZ#530383)\n\n* soft lockups: inotify race and contention on dcache_lock. (BZ#533822,\nBZ#537019)\n\n* priority ordered lists are now used for threads waiting for a given\nmutex. (BZ#533858)\n\n* a deadlock in DLM could cause GFS2 file systems to lock up. (BZ#533859)\n\n* use-after-free bug in the audit subsystem crashed certain systems when\nrunning usermod. (BZ#533861)\n\n* on certain hardware configurations, a kernel panic when the Broadcom\niSCSI offload driver (bnx2i.ko and cnic.ko) was loaded. (BZ#537014)\n\n* qla2xxx: Enabled MSI-X, and correctly handle the module parameter to\ncontrol it. This improves performance for certain systems. (BZ#537020)\n\n* system crash when reading the cpuaffinity file on a system. (BZ#537346)\n\n* suspend-resume problems on systems with lots of logical CPUs, e.g. BX-EX.\n(BZ#539674)\n\n* off-by-one error in the legacy PCI bus check. (BZ#539675)\n\n* TSC was not made available on systems with multi-clustered APICs. This\ncould cause slow performance for time-sensitive applications. (BZ#539676)\n\n* ACPI: ARB_DISABLE now disabled on platforms that do not need it.\n(BZ#539677)\n\n* fix node to core and power-aware scheduling issues, and a kernel panic\nduring boot on certain AMD Opteron processors. (BZ#539678, BZ#540469,\nBZ#539680, BZ#539682)\n\n* APIC timer interrupt issues on some AMD Opteron systems prevented\nachieving full power savings. (BZ#539681)\n\n* general OProfile support for some newer Intel processors. (BZ#539683)\n\n* system crash during boot when NUMA is enabled on systems using MC and\nkernel-xen. (BZ#539684)\n\n* on some larger systems, performance issues due to a spinlock. (BZ#539685)\n\n* APIC errors when IOMMU is enabled on some AMD Opteron systems.\n(BZ#539687)\n\n* on some AMD Opteron systems, repeatedly taking a CPU offline then online\ncaused a system hang. (BZ#539688)\n\n* I/O page fault errors on some systems. (BZ#539689)\n\n* certain memory configurations could cause the kernel-xen kernel to fail\nto boot on some AMD Opteron systems. (BZ#539690)\n\n* NMI watchdog is now disabled for offline CPUs. (BZ#539691)\n\n* duplicate directories in /proc/acpi/processor/ on BX-EX systems.\n(BZ#539692)\n\n* links did not come up when using bnx2x with certain Broadcom devices.\n(BZ#540381)\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2009:1670",
        "url": "https://access.redhat.com/errata/RHSA-2009:1670"
      },
      {
        "category": "external",
        "summary": "539684",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539684"
      },
      {
        "category": "external",
        "summary": "539685",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539685"
      },
      {
        "category": "external",
        "summary": "539687",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539687"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "http://kbase.redhat.com/faq/docs/DOC-20536",
        "url": "http://kbase.redhat.com/faq/docs/DOC-20536"
      },
      {
        "category": "external",
        "summary": "528868",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=528868"
      },
      {
        "category": "external",
        "summary": "529227",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529227"
      },
      {
        "category": "external",
        "summary": "529308",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529308"
      },
      {
        "category": "external",
        "summary": "529597",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529597"
      },
      {
        "category": "external",
        "summary": "529626",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529626"
      },
      {
        "category": "external",
        "summary": "530383",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=530383"
      },
      {
        "category": "external",
        "summary": "533822",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533822"
      },
      {
        "category": "external",
        "summary": "533858",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533858"
      },
      {
        "category": "external",
        "summary": "533861",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533861"
      },
      {
        "category": "external",
        "summary": "537014",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=537014"
      },
      {
        "category": "external",
        "summary": "537019",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=537019"
      },
      {
        "category": "external",
        "summary": "537020",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=537020"
      },
      {
        "category": "external",
        "summary": "537346",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=537346"
      },
      {
        "category": "external",
        "summary": "539675",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539675"
      },
      {
        "category": "external",
        "summary": "539676",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539676"
      },
      {
        "category": "external",
        "summary": "539677",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539677"
      },
      {
        "category": "external",
        "summary": "539678",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539678"
      },
      {
        "category": "external",
        "summary": "539680",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539680"
      },
      {
        "category": "external",
        "summary": "539681",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539681"
      },
      {
        "category": "external",
        "summary": "539682",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539682"
      },
      {
        "category": "external",
        "summary": "539683",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539683"
      },
      {
        "category": "external",
        "summary": "539688",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539688"
      },
      {
        "category": "external",
        "summary": "539689",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539689"
      },
      {
        "category": "external",
        "summary": "539690",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539690"
      },
      {
        "category": "external",
        "summary": "539691",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539691"
      },
      {
        "category": "external",
        "summary": "540381",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=540381"
      },
      {
        "category": "external",
        "summary": "540469",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=540469"
      },
      {
        "category": "external",
        "summary": "533859",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533859"
      },
      {
        "category": "external",
        "summary": "545583",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=545583"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1670.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security and bug fix update",
    "tracking": {
      "current_release_date": "2025-10-09T13:25:53+00:00",
      "generator": {
        "date": "2025-10-09T13:25:53+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2009:1670",
      "initial_release_date": "2009-12-15T17:05:00+00:00",
      "revision_history": [
        {
          "date": "2009-12-15T17:05:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2009-12-15T12:18:47+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T13:25:53+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
                "product": {
                  "name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
                  "product_id": "5Client",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:5::client"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux (v. 5 server)",
                "product": {
                  "name": "Red Hat Enterprise Linux (v. 5 server)",
                  "product_id": "5Server",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:5::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
                "product": {
                  "name": "kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
                  "product_id": "kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-164.9.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-0:2.6.18-164.9.1.el5.i686",
                "product": {
                  "name": "kernel-xen-0:2.6.18-164.9.1.el5.i686",
                  "product_id": "kernel-xen-0:2.6.18-164.9.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-164.9.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-164.9.1.el5.i686",
                "product": {
                  "name": "kernel-devel-0:2.6.18-164.9.1.el5.i686",
                  "product_id": "kernel-devel-0:2.6.18-164.9.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-164.9.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-164.9.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-PAE-0:2.6.18-164.9.1.el5.i686",
                "product": {
                  "name": "kernel-PAE-0:2.6.18-164.9.1.el5.i686",
                  "product_id": "kernel-PAE-0:2.6.18-164.9.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-164.9.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
                "product": {
                  "name": "kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
                  "product_id": "kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-164.9.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
                "product": {
                  "name": "kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
                  "product_id": "kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-164.9.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
                  "product_id": "kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-164.9.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
                "product": {
                  "name": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
                  "product_id": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-164.9.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-164.9.1.el5.i686",
                "product": {
                  "name": "kernel-0:2.6.18-164.9.1.el5.i686",
                  "product_id": "kernel-0:2.6.18-164.9.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-164.9.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-164.9.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
                  "product_id": "kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-164.9.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-164.9.1.el5.i686",
                "product": {
                  "name": "kernel-debug-0:2.6.18-164.9.1.el5.i686",
                  "product_id": "kernel-debug-0:2.6.18-164.9.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-164.9.1.el5?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-164.9.1.el5.i386",
                "product": {
                  "name": "kernel-headers-0:2.6.18-164.9.1.el5.i386",
                  "product_id": "kernel-headers-0:2.6.18-164.9.1.el5.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-164.9.1.el5?arch=i386"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i386"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
                "product": {
                  "name": "kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
                  "product_id": "kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-164.9.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
                "product": {
                  "name": "kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
                  "product_id": "kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-164.9.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-164.9.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
                "product": {
                  "name": "kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
                  "product_id": "kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-164.9.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64",
                "product": {
                  "name": "kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64",
                  "product_id": "kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-164.9.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
                  "product_id": "kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-164.9.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
                "product": {
                  "name": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
                  "product_id": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-164.9.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-164.9.1.el5.x86_64",
                "product": {
                  "name": "kernel-0:2.6.18-164.9.1.el5.x86_64",
                  "product_id": "kernel-0:2.6.18-164.9.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-164.9.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-164.9.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
                  "product_id": "kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-164.9.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
                "product": {
                  "name": "kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
                  "product_id": "kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-164.9.1.el5?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-doc-0:2.6.18-164.9.1.el5.noarch",
                "product": {
                  "name": "kernel-doc-0:2.6.18-164.9.1.el5.noarch",
                  "product_id": "kernel-doc-0:2.6.18-164.9.1.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@2.6.18-164.9.1.el5?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-164.9.1.el5.src",
                "product": {
                  "name": "kernel-0:2.6.18-164.9.1.el5.src",
                  "product_id": "kernel-0:2.6.18-164.9.1.el5.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-164.9.1.el5?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-xen-0:2.6.18-164.9.1.el5.ia64",
                "product": {
                  "name": "kernel-xen-0:2.6.18-164.9.1.el5.ia64",
                  "product_id": "kernel-xen-0:2.6.18-164.9.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-164.9.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-164.9.1.el5.ia64",
                "product": {
                  "name": "kernel-devel-0:2.6.18-164.9.1.el5.ia64",
                  "product_id": "kernel-devel-0:2.6.18-164.9.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-164.9.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-164.9.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-164.9.1.el5.ia64",
                "product": {
                  "name": "kernel-headers-0:2.6.18-164.9.1.el5.ia64",
                  "product_id": "kernel-headers-0:2.6.18-164.9.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-164.9.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
                "product": {
                  "name": "kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
                  "product_id": "kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-164.9.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
                  "product_id": "kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-164.9.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
                "product": {
                  "name": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
                  "product_id": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-164.9.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-164.9.1.el5.ia64",
                "product": {
                  "name": "kernel-0:2.6.18-164.9.1.el5.ia64",
                  "product_id": "kernel-0:2.6.18-164.9.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-164.9.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-164.9.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
                  "product_id": "kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-164.9.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-164.9.1.el5.ia64",
                "product": {
                  "name": "kernel-debug-0:2.6.18-164.9.1.el5.ia64",
                  "product_id": "kernel-debug-0:2.6.18-164.9.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-164.9.1.el5?arch=ia64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ia64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
                "product": {
                  "name": "kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
                  "product_id": "kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-164.9.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-164.9.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
                "product": {
                  "name": "kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
                  "product_id": "kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-164.9.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
                "product": {
                  "name": "kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
                  "product_id": "kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-164.9.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
                  "product_id": "kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-164.9.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
                "product": {
                  "name": "kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
                  "product_id": "kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-164.9.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-164.9.1.el5.ppc64",
                "product": {
                  "name": "kernel-0:2.6.18-164.9.1.el5.ppc64",
                  "product_id": "kernel-0:2.6.18-164.9.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-164.9.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-164.9.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
                "product": {
                  "name": "kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
                  "product_id": "kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-164.9.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
                  "product_id": "kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-164.9.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
                "product": {
                  "name": "kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
                  "product_id": "kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-164.9.1.el5?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-164.9.1.el5.ppc",
                "product": {
                  "name": "kernel-headers-0:2.6.18-164.9.1.el5.ppc",
                  "product_id": "kernel-headers-0:2.6.18-164.9.1.el5.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-164.9.1.el5?arch=ppc"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-164.9.1.el5.s390x",
                "product": {
                  "name": "kernel-devel-0:2.6.18-164.9.1.el5.s390x",
                  "product_id": "kernel-devel-0:2.6.18-164.9.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-164.9.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-164.9.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-164.9.1.el5.s390x",
                "product": {
                  "name": "kernel-headers-0:2.6.18-164.9.1.el5.s390x",
                  "product_id": "kernel-headers-0:2.6.18-164.9.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-164.9.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
                "product": {
                  "name": "kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
                  "product_id": "kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-164.9.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
                  "product_id": "kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-164.9.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
                "product": {
                  "name": "kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
                  "product_id": "kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-164.9.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-164.9.1.el5.s390x",
                "product": {
                  "name": "kernel-0:2.6.18-164.9.1.el5.s390x",
                  "product_id": "kernel-0:2.6.18-164.9.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-164.9.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-164.9.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
                "product": {
                  "name": "kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
                  "product_id": "kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-164.9.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
                  "product_id": "kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-164.9.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-164.9.1.el5.s390x",
                "product": {
                  "name": "kernel-debug-0:2.6.18-164.9.1.el5.s390x",
                  "product_id": "kernel-debug-0:2.6.18-164.9.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-164.9.1.el5?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-0:2.6.18-164.9.1.el5.i686"
        },
        "product_reference": "kernel-0:2.6.18-164.9.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-0:2.6.18-164.9.1.el5.ia64"
        },
        "product_reference": "kernel-0:2.6.18-164.9.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-0:2.6.18-164.9.1.el5.ppc64"
        },
        "product_reference": "kernel-0:2.6.18-164.9.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-0:2.6.18-164.9.1.el5.s390x"
        },
        "product_reference": "kernel-0:2.6.18-164.9.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-164.9.1.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-0:2.6.18-164.9.1.el5.src"
        },
        "product_reference": "kernel-0:2.6.18-164.9.1.el5.src",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-0:2.6.18-164.9.1.el5.x86_64"
        },
        "product_reference": "kernel-0:2.6.18-164.9.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-PAE-0:2.6.18-164.9.1.el5.i686"
        },
        "product_reference": "kernel-PAE-0:2.6.18-164.9.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686"
        },
        "product_reference": "kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686"
        },
        "product_reference": "kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-0:2.6.18-164.9.1.el5.i686"
        },
        "product_reference": "kernel-debug-0:2.6.18-164.9.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ia64"
        },
        "product_reference": "kernel-debug-0:2.6.18-164.9.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ppc64"
        },
        "product_reference": "kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-0:2.6.18-164.9.1.el5.s390x"
        },
        "product_reference": "kernel-debug-0:2.6.18-164.9.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-0:2.6.18-164.9.1.el5.x86_64"
        },
        "product_reference": "kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-devel-0:2.6.18-164.9.1.el5.i686"
        },
        "product_reference": "kernel-devel-0:2.6.18-164.9.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.18-164.9.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-devel-0:2.6.18-164.9.1.el5.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.18-164.9.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-devel-0:2.6.18-164.9.1.el5.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.18-164.9.1.el5.noarch as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-doc-0:2.6.18-164.9.1.el5.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.18-164.9.1.el5.noarch",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-164.9.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-headers-0:2.6.18-164.9.1.el5.i386"
        },
        "product_reference": "kernel-headers-0:2.6.18-164.9.1.el5.i386",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ia64"
        },
        "product_reference": "kernel-headers-0:2.6.18-164.9.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-164.9.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc"
        },
        "product_reference": "kernel-headers-0:2.6.18-164.9.1.el5.ppc",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc64"
        },
        "product_reference": "kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-headers-0:2.6.18-164.9.1.el5.s390x"
        },
        "product_reference": "kernel-headers-0:2.6.18-164.9.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-headers-0:2.6.18-164.9.1.el5.x86_64"
        },
        "product_reference": "kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64"
        },
        "product_reference": "kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.s390x"
        },
        "product_reference": "kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64"
        },
        "product_reference": "kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64"
        },
        "product_reference": "kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-0:2.6.18-164.9.1.el5.i686"
        },
        "product_reference": "kernel-xen-0:2.6.18-164.9.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-0:2.6.18-164.9.1.el5.ia64"
        },
        "product_reference": "kernel-xen-0:2.6.18-164.9.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-0:2.6.18-164.9.1.el5.x86_64"
        },
        "product_reference": "kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-0:2.6.18-164.9.1.el5.i686"
        },
        "product_reference": "kernel-0:2.6.18-164.9.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-0:2.6.18-164.9.1.el5.ia64"
        },
        "product_reference": "kernel-0:2.6.18-164.9.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-0:2.6.18-164.9.1.el5.ppc64"
        },
        "product_reference": "kernel-0:2.6.18-164.9.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-0:2.6.18-164.9.1.el5.s390x"
        },
        "product_reference": "kernel-0:2.6.18-164.9.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-164.9.1.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-0:2.6.18-164.9.1.el5.src"
        },
        "product_reference": "kernel-0:2.6.18-164.9.1.el5.src",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-0:2.6.18-164.9.1.el5.x86_64"
        },
        "product_reference": "kernel-0:2.6.18-164.9.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-PAE-0:2.6.18-164.9.1.el5.i686"
        },
        "product_reference": "kernel-PAE-0:2.6.18-164.9.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686"
        },
        "product_reference": "kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686"
        },
        "product_reference": "kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-0:2.6.18-164.9.1.el5.i686"
        },
        "product_reference": "kernel-debug-0:2.6.18-164.9.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ia64"
        },
        "product_reference": "kernel-debug-0:2.6.18-164.9.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ppc64"
        },
        "product_reference": "kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-0:2.6.18-164.9.1.el5.s390x"
        },
        "product_reference": "kernel-debug-0:2.6.18-164.9.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-0:2.6.18-164.9.1.el5.x86_64"
        },
        "product_reference": "kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-devel-0:2.6.18-164.9.1.el5.i686"
        },
        "product_reference": "kernel-devel-0:2.6.18-164.9.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.18-164.9.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-devel-0:2.6.18-164.9.1.el5.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.18-164.9.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-devel-0:2.6.18-164.9.1.el5.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.18-164.9.1.el5.noarch as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-doc-0:2.6.18-164.9.1.el5.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.18-164.9.1.el5.noarch",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-164.9.1.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-headers-0:2.6.18-164.9.1.el5.i386"
        },
        "product_reference": "kernel-headers-0:2.6.18-164.9.1.el5.i386",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ia64"
        },
        "product_reference": "kernel-headers-0:2.6.18-164.9.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-164.9.1.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc"
        },
        "product_reference": "kernel-headers-0:2.6.18-164.9.1.el5.ppc",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc64"
        },
        "product_reference": "kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-headers-0:2.6.18-164.9.1.el5.s390x"
        },
        "product_reference": "kernel-headers-0:2.6.18-164.9.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-headers-0:2.6.18-164.9.1.el5.x86_64"
        },
        "product_reference": "kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64"
        },
        "product_reference": "kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.s390x"
        },
        "product_reference": "kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64"
        },
        "product_reference": "kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64"
        },
        "product_reference": "kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-0:2.6.18-164.9.1.el5.i686"
        },
        "product_reference": "kernel-xen-0:2.6.18-164.9.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-0:2.6.18-164.9.1.el5.ia64"
        },
        "product_reference": "kernel-xen-0:2.6.18-164.9.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-0:2.6.18-164.9.1.el5.x86_64"
        },
        "product_reference": "kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2009-3612",
      "discovery_date": "2009-10-14T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "528868"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The tcf_fill_node function in net/sched/cls_api.c in the netlink subsystem in the Linux kernel 2.6.x before 2.6.32-rc5, and 2.4.37.6 and earlier, does not initialize a certain tcm__pad2 structure member, which might allow local users to obtain sensitive information from kernel memory via unspecified vectors.  NOTE: this issue exists because of an incomplete fix for CVE-2005-4881.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: tcf_fill_node() infoleak due to typo in 9ef1d4c7",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is not planned to be fixed in Red Hat Enterprise Linux 3 due to this product being in Production 3 of its maintenance life-cycle, where only qualified security errata of important or critical impact are addressed.\n\nFor further information about the Errata Support Policy, visit: https://access.redhat.com/support/policy/updates/errata/",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-0:2.6.18-164.9.1.el5.src",
          "5Client:kernel-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-164.9.1.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-164.9.1.el5.i386",
          "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-xen-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-0:2.6.18-164.9.1.el5.src",
          "5Server:kernel-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-164.9.1.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-164.9.1.el5.i386",
          "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-xen-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3612"
        },
        {
          "category": "external",
          "summary": "RHBZ#528868",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=528868"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3612",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3612"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3612",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3612"
        }
      ],
      "release_date": "2009-10-08T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-12-15T17:05:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.9.1.el5.src",
            "5Client:kernel-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.9.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.9.1.el5.src",
            "5Server:kernel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.9.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1670"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.9.1.el5.src",
            "5Client:kernel-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.9.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.9.1.el5.src",
            "5Server:kernel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.9.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: tcf_fill_node() infoleak due to typo in 9ef1d4c7"
    },
    {
      "cve": "CVE-2009-3620",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2009-10-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "529597"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The ATI Rage 128 (aka r128) driver in the Linux kernel before 2.6.31-git11 does not properly verify Concurrent Command Engine (CCE) state initialization, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly gain privileges via unspecified ioctl calls.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: r128 IOCTL NULL pointer dereferences when CCE state is uninitialised",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-0:2.6.18-164.9.1.el5.src",
          "5Client:kernel-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-164.9.1.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-164.9.1.el5.i386",
          "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-xen-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-0:2.6.18-164.9.1.el5.src",
          "5Server:kernel-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-164.9.1.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-164.9.1.el5.i386",
          "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-xen-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3620"
        },
        {
          "category": "external",
          "summary": "RHBZ#529597",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529597"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3620",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3620"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3620",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3620"
        }
      ],
      "release_date": "2009-08-30T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-12-15T17:05:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.9.1.el5.src",
            "5Client:kernel-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.9.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.9.1.el5.src",
            "5Server:kernel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.9.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1670"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.9,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.9.1.el5.src",
            "5Client:kernel-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.9.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.9.1.el5.src",
            "5Server:kernel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.9.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: r128 IOCTL NULL pointer dereferences when CCE state is uninitialised"
    },
    {
      "cve": "CVE-2009-3621",
      "discovery_date": "2009-10-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "529626"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "net/unix/af_unix.c in the Linux kernel 2.6.31.4 and earlier allows local users to cause a denial of service (system hang) by creating an abstract-namespace AF_UNIX listening socket, performing a shutdown operation on this socket, and then performing a series of connect operations to this socket.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: AF_UNIX: Fix deadlock on connecting to shutdown socket",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is not planned to be fixed in Red Hat Enterprise Linux 3, due to this product being in Production 3 of its maintenance life-cycle, where only qualified security errata of important or critical impact are addressed.\n\nFor further information about Errata Support Policy, visit: https://access.redhat.com/support/policy/updates/errata/",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-0:2.6.18-164.9.1.el5.src",
          "5Client:kernel-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-164.9.1.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-164.9.1.el5.i386",
          "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-xen-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-0:2.6.18-164.9.1.el5.src",
          "5Server:kernel-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-164.9.1.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-164.9.1.el5.i386",
          "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-xen-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3621"
        },
        {
          "category": "external",
          "summary": "RHBZ#529626",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529626"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3621",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3621"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3621",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3621"
        }
      ],
      "release_date": "2009-10-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-12-15T17:05:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.9.1.el5.src",
            "5Client:kernel-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.9.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.9.1.el5.src",
            "5Server:kernel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.9.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1670"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.9,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.9.1.el5.src",
            "5Client:kernel-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.9.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.9.1.el5.src",
            "5Server:kernel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.9.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: AF_UNIX: Fix deadlock on connecting to shutdown socket"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Simon Vallet"
          ]
        }
      ],
      "cve": "CVE-2009-3726",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2009-11-05T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "529227"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The nfs4_proc_lock function in fs/nfs/nfs4proc.c in the NFSv4 client in the Linux kernel before 2.6.31-rc4 allows remote NFS servers to cause a denial of service (NULL pointer dereference and panic) by sending a certain response containing incorrect file attributes, which trigger attempted use of an open file that lacks NFSv4 state.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: nfsv4: kernel panic in nfs4_proc_lock()",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The Linux kernel as shipped with Red Hat Enterprise Linux 3 did not have support for NFSv4, and therefore is not affected by this issue. It was addressed in Red Hat Enterprise Linux 4, 5, and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2010-0474.html, https://rhn.redhat.com/errata/RHSA-2009-1670.html and https://rhn.redhat.com/errata/RHSA-2009-1635.html respectively.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-0:2.6.18-164.9.1.el5.src",
          "5Client:kernel-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-164.9.1.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-164.9.1.el5.i386",
          "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-xen-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-0:2.6.18-164.9.1.el5.src",
          "5Server:kernel-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-164.9.1.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-164.9.1.el5.i386",
          "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-xen-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3726"
        },
        {
          "category": "external",
          "summary": "RHBZ#529227",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529227"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3726",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3726"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3726",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3726"
        }
      ],
      "release_date": "2008-10-22T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-12-15T17:05:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.9.1.el5.src",
            "5Client:kernel-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.9.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.9.1.el5.src",
            "5Server:kernel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.9.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1670"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.9.1.el5.src",
            "5Client:kernel-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.9.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.9.1.el5.src",
            "5Server:kernel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.9.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: nfsv4: kernel panic in nfs4_proc_lock()"
    }
  ]
}
  rhsa-2010:0882
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated kernel packages that fix several security issues and one bug are\nnow available for Red Hat Enterprise Linux 3 Extended Life Cycle Support\n(ELS).\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues:\n\n* An array index error was found in the gdth driver in the Linux kernel. A\nlocal user could send a specially-crafted IOCTL request that would cause a\ndenial of service or, possibly, privilege escalation. (CVE-2009-3080,\nImportant)\n\n* NULL pointer dereference flaws were found in the r128 driver in the Linux\nkernel. Checks to test if the Concurrent Command Engine state was\ninitialized were missing in private IOCTL functions. An attacker could use\nthese flaws to cause a local denial of service or escalate their\nprivileges. (CVE-2009-3620, Important)\n\n* A flaw was found in the Intel PRO/1000 Linux driver, e1000, in the Linux\nkernel. A remote attacker using packets larger than the MTU could bypass\nthe existing fragment check, resulting in partial, invalid frames being\npassed to the network stack. This flaw could also possibly be used to\ntrigger a remote denial of service. (CVE-2009-4536, Important)\n\n* A use-after-free flaw was found in the tcp_rcv_state_process() function\nin the Linux kernel TCP/IP protocol suite implementation. If a system using\nIPv6 had the IPV6_PKTINFO option set on a listening socket, a remote\nattacker could send an IPv6 packet to that system, causing a kernel panic\n(denial of service). (CVE-2010-1188, Important)\n\n* When an application has a stack overflow, the stack could silently\noverwrite another memory mapped area instead of a segmentation fault\noccurring, which could cause an application to execute arbitrary code,\npossibly leading to privilege escalation. It is known that the X Window\nSystem server can be used to trigger this flaw. (CVE-2010-2240, Important)\n\n* The compat_alloc_user_space() function in the Linux kernel 32/64-bit\ncompatibility layer implementation was missing sanity checks. This function\ncould be abused in other areas of the Linux kernel. On 64-bit systems, a\nlocal, unprivileged user could use this flaw to escalate their privileges.\n(CVE-2010-3081, Important)\n\nRed Hat would like to thank the X.Org security team for reporting the\nCVE-2010-2240 issue, with upstream acknowledging Rafal Wojtczuk as the\noriginal reporter; and Ben Hawkes for reporting the CVE-2010-3081 issue.\n\nThis update also fixes the following bug:\n\n* The RHSA-2009:1550 kernel update introduced a regression that prevented\ncertain custom kernel modules from loading, failing with \"unresolved\nsymbol\" errors. This update corrects this issue, allowing the affected\nmodules to load as expected. (BZ#556909)\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2010:0882",
        "url": "https://access.redhat.com/errata/RHSA-2010:0882"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/kb/docs/DOC-40265",
        "url": "https://access.redhat.com/kb/docs/DOC-40265"
      },
      {
        "category": "external",
        "summary": "http://www.redhat.com/rhel/server/extended_lifecycle_support/",
        "url": "http://www.redhat.com/rhel/server/extended_lifecycle_support/"
      },
      {
        "category": "external",
        "summary": "529597",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529597"
      },
      {
        "category": "external",
        "summary": "539414",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539414"
      },
      {
        "category": "external",
        "summary": "552126",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=552126"
      },
      {
        "category": "external",
        "summary": "556909",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=556909"
      },
      {
        "category": "external",
        "summary": "577711",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=577711"
      },
      {
        "category": "external",
        "summary": "606611",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=606611"
      },
      {
        "category": "external",
        "summary": "634457",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=634457"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0882.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security and bug fix update",
    "tracking": {
      "current_release_date": "2025-10-09T13:22:18+00:00",
      "generator": {
        "date": "2025-10-09T13:22:18+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2010:0882",
      "initial_release_date": "2010-11-12T09:36:00+00:00",
      "revision_history": [
        {
          "date": "2010-11-12T09:36:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2010-11-12T04:36:39+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T13:22:18+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AS (v. 3 ELS)",
                "product": {
                  "name": "Red Hat Enterprise Linux AS (v. 3 ELS)",
                  "product_id": "3AS-ELS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_els:3::as"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux ES (v. 3 ELS)",
                "product": {
                  "name": "Red Hat Enterprise Linux ES (v. 3 ELS)",
                  "product_id": "3ES-ELS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_els:3::es"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-BOOT-0:2.4.21-66.EL.i386",
                "product": {
                  "name": "kernel-BOOT-0:2.4.21-66.EL.i386",
                  "product_id": "kernel-BOOT-0:2.4.21-66.EL.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-BOOT@2.4.21-66.EL?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-doc-0:2.4.21-66.EL.i386",
                "product": {
                  "name": "kernel-doc-0:2.4.21-66.EL.i386",
                  "product_id": "kernel-doc-0:2.4.21-66.EL.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-66.EL?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.4.21-66.EL.i386",
                "product": {
                  "name": "kernel-debuginfo-0:2.4.21-66.EL.i386",
                  "product_id": "kernel-debuginfo-0:2.4.21-66.EL.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-66.EL?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-0:2.4.21-66.EL.i386",
                "product": {
                  "name": "kernel-source-0:2.4.21-66.EL.i386",
                  "product_id": "kernel-source-0:2.4.21-66.EL.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-source@2.4.21-66.EL?arch=i386"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i386"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-unsupported-0:2.4.21-66.EL.i686",
                "product": {
                  "name": "kernel-unsupported-0:2.4.21-66.EL.i686",
                  "product_id": "kernel-unsupported-0:2.4.21-66.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-66.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-hugemem-0:2.4.21-66.EL.i686",
                "product": {
                  "name": "kernel-hugemem-0:2.4.21-66.EL.i686",
                  "product_id": "kernel-hugemem-0:2.4.21-66.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-hugemem@2.4.21-66.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.4.21-66.EL.i686",
                "product": {
                  "name": "kernel-0:2.4.21-66.EL.i686",
                  "product_id": "kernel-0:2.4.21-66.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.4.21-66.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-smp-unsupported-0:2.4.21-66.EL.i686",
                "product": {
                  "name": "kernel-smp-unsupported-0:2.4.21-66.EL.i686",
                  "product_id": "kernel-smp-unsupported-0:2.4.21-66.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-smp-unsupported@2.4.21-66.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.4.21-66.EL.i686",
                "product": {
                  "name": "kernel-debuginfo-0:2.4.21-66.EL.i686",
                  "product_id": "kernel-debuginfo-0:2.4.21-66.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-66.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-smp-0:2.4.21-66.EL.i686",
                "product": {
                  "name": "kernel-smp-0:2.4.21-66.EL.i686",
                  "product_id": "kernel-smp-0:2.4.21-66.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-smp@2.4.21-66.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
                "product": {
                  "name": "kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
                  "product_id": "kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-hugemem-unsupported@2.4.21-66.EL?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-unsupported-0:2.4.21-66.EL.athlon",
                "product": {
                  "name": "kernel-unsupported-0:2.4.21-66.EL.athlon",
                  "product_id": "kernel-unsupported-0:2.4.21-66.EL.athlon",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-66.EL?arch=athlon"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.4.21-66.EL.athlon",
                "product": {
                  "name": "kernel-0:2.4.21-66.EL.athlon",
                  "product_id": "kernel-0:2.4.21-66.EL.athlon",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.4.21-66.EL?arch=athlon"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
                "product": {
                  "name": "kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
                  "product_id": "kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-smp-unsupported@2.4.21-66.EL?arch=athlon"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.4.21-66.EL.athlon",
                "product": {
                  "name": "kernel-debuginfo-0:2.4.21-66.EL.athlon",
                  "product_id": "kernel-debuginfo-0:2.4.21-66.EL.athlon",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-66.EL?arch=athlon"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-smp-0:2.4.21-66.EL.athlon",
                "product": {
                  "name": "kernel-smp-0:2.4.21-66.EL.athlon",
                  "product_id": "kernel-smp-0:2.4.21-66.EL.athlon",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-smp@2.4.21-66.EL?arch=athlon"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "athlon"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:2.4.21-66.EL.src",
                "product": {
                  "name": "kernel-0:2.4.21-66.EL.src",
                  "product_id": "kernel-0:2.4.21-66.EL.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.4.21-66.EL?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-66.EL.athlon as a component of Red Hat Enterprise Linux AS (v. 3 ELS)",
          "product_id": "3AS-ELS:kernel-0:2.4.21-66.EL.athlon"
        },
        "product_reference": "kernel-0:2.4.21-66.EL.athlon",
        "relates_to_product_reference": "3AS-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)",
          "product_id": "3AS-ELS:kernel-0:2.4.21-66.EL.i686"
        },
        "product_reference": "kernel-0:2.4.21-66.EL.i686",
        "relates_to_product_reference": "3AS-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-66.EL.src as a component of Red Hat Enterprise Linux AS (v. 3 ELS)",
          "product_id": "3AS-ELS:kernel-0:2.4.21-66.EL.src"
        },
        "product_reference": "kernel-0:2.4.21-66.EL.src",
        "relates_to_product_reference": "3AS-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-BOOT-0:2.4.21-66.EL.i386 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)",
          "product_id": "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386"
        },
        "product_reference": "kernel-BOOT-0:2.4.21-66.EL.i386",
        "relates_to_product_reference": "3AS-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-66.EL.athlon as a component of Red Hat Enterprise Linux AS (v. 3 ELS)",
          "product_id": "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-66.EL.athlon",
        "relates_to_product_reference": "3AS-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-66.EL.i386 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)",
          "product_id": "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-66.EL.i386",
        "relates_to_product_reference": "3AS-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)",
          "product_id": "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-66.EL.i686",
        "relates_to_product_reference": "3AS-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.4.21-66.EL.i386 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)",
          "product_id": "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386"
        },
        "product_reference": "kernel-doc-0:2.4.21-66.EL.i386",
        "relates_to_product_reference": "3AS-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)",
          "product_id": "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686"
        },
        "product_reference": "kernel-hugemem-0:2.4.21-66.EL.i686",
        "relates_to_product_reference": "3AS-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-unsupported-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)",
          "product_id": "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686"
        },
        "product_reference": "kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
        "relates_to_product_reference": "3AS-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.4.21-66.EL.athlon as a component of Red Hat Enterprise Linux AS (v. 3 ELS)",
          "product_id": "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon"
        },
        "product_reference": "kernel-smp-0:2.4.21-66.EL.athlon",
        "relates_to_product_reference": "3AS-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)",
          "product_id": "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686"
        },
        "product_reference": "kernel-smp-0:2.4.21-66.EL.i686",
        "relates_to_product_reference": "3AS-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-unsupported-0:2.4.21-66.EL.athlon as a component of Red Hat Enterprise Linux AS (v. 3 ELS)",
          "product_id": "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon"
        },
        "product_reference": "kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
        "relates_to_product_reference": "3AS-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-unsupported-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)",
          "product_id": "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686"
        },
        "product_reference": "kernel-smp-unsupported-0:2.4.21-66.EL.i686",
        "relates_to_product_reference": "3AS-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-0:2.4.21-66.EL.i386 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)",
          "product_id": "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386"
        },
        "product_reference": "kernel-source-0:2.4.21-66.EL.i386",
        "relates_to_product_reference": "3AS-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-66.EL.athlon as a component of Red Hat Enterprise Linux AS (v. 3 ELS)",
          "product_id": "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-66.EL.athlon",
        "relates_to_product_reference": "3AS-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)",
          "product_id": "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-66.EL.i686",
        "relates_to_product_reference": "3AS-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-66.EL.athlon as a component of Red Hat Enterprise Linux ES (v. 3 ELS)",
          "product_id": "3ES-ELS:kernel-0:2.4.21-66.EL.athlon"
        },
        "product_reference": "kernel-0:2.4.21-66.EL.athlon",
        "relates_to_product_reference": "3ES-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)",
          "product_id": "3ES-ELS:kernel-0:2.4.21-66.EL.i686"
        },
        "product_reference": "kernel-0:2.4.21-66.EL.i686",
        "relates_to_product_reference": "3ES-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-66.EL.src as a component of Red Hat Enterprise Linux ES (v. 3 ELS)",
          "product_id": "3ES-ELS:kernel-0:2.4.21-66.EL.src"
        },
        "product_reference": "kernel-0:2.4.21-66.EL.src",
        "relates_to_product_reference": "3ES-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-BOOT-0:2.4.21-66.EL.i386 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)",
          "product_id": "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386"
        },
        "product_reference": "kernel-BOOT-0:2.4.21-66.EL.i386",
        "relates_to_product_reference": "3ES-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-66.EL.athlon as a component of Red Hat Enterprise Linux ES (v. 3 ELS)",
          "product_id": "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-66.EL.athlon",
        "relates_to_product_reference": "3ES-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-66.EL.i386 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)",
          "product_id": "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-66.EL.i386",
        "relates_to_product_reference": "3ES-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)",
          "product_id": "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-66.EL.i686",
        "relates_to_product_reference": "3ES-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.4.21-66.EL.i386 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)",
          "product_id": "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386"
        },
        "product_reference": "kernel-doc-0:2.4.21-66.EL.i386",
        "relates_to_product_reference": "3ES-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)",
          "product_id": "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686"
        },
        "product_reference": "kernel-hugemem-0:2.4.21-66.EL.i686",
        "relates_to_product_reference": "3ES-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-unsupported-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)",
          "product_id": "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686"
        },
        "product_reference": "kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
        "relates_to_product_reference": "3ES-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.4.21-66.EL.athlon as a component of Red Hat Enterprise Linux ES (v. 3 ELS)",
          "product_id": "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon"
        },
        "product_reference": "kernel-smp-0:2.4.21-66.EL.athlon",
        "relates_to_product_reference": "3ES-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)",
          "product_id": "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686"
        },
        "product_reference": "kernel-smp-0:2.4.21-66.EL.i686",
        "relates_to_product_reference": "3ES-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-unsupported-0:2.4.21-66.EL.athlon as a component of Red Hat Enterprise Linux ES (v. 3 ELS)",
          "product_id": "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon"
        },
        "product_reference": "kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
        "relates_to_product_reference": "3ES-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-unsupported-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)",
          "product_id": "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686"
        },
        "product_reference": "kernel-smp-unsupported-0:2.4.21-66.EL.i686",
        "relates_to_product_reference": "3ES-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-0:2.4.21-66.EL.i386 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)",
          "product_id": "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386"
        },
        "product_reference": "kernel-source-0:2.4.21-66.EL.i386",
        "relates_to_product_reference": "3ES-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-66.EL.athlon as a component of Red Hat Enterprise Linux ES (v. 3 ELS)",
          "product_id": "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-66.EL.athlon",
        "relates_to_product_reference": "3ES-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)",
          "product_id": "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-66.EL.i686",
        "relates_to_product_reference": "3ES-ELS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2009-3080",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2009-11-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "539414"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Array index error in the gdth_read_event function in drivers/scsi/gdth.c in the Linux kernel before 2.6.32-rc8 allows local users to cause a denial of service or possibly gain privileges via a negative event index in an IOCTL request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: gdth: Prevent negative offsets in ioctl",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "3AS-ELS:kernel-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-0:2.4.21-66.EL.src",
          "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
          "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
          "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386",
          "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386",
          "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-0:2.4.21-66.EL.src",
          "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
          "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
          "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386",
          "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386",
          "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3080"
        },
        {
          "category": "external",
          "summary": "RHBZ#539414",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539414"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3080",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3080"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3080",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3080"
        }
      ],
      "release_date": "2009-11-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-11-12T09:36:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
          "product_ids": [
            "3AS-ELS:kernel-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-0:2.4.21-66.EL.src",
            "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-0:2.4.21-66.EL.src",
            "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0882"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "3AS-ELS:kernel-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-0:2.4.21-66.EL.src",
            "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-0:2.4.21-66.EL.src",
            "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: gdth: Prevent negative offsets in ioctl"
    },
    {
      "cve": "CVE-2009-3620",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2009-10-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "529597"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The ATI Rage 128 (aka r128) driver in the Linux kernel before 2.6.31-git11 does not properly verify Concurrent Command Engine (CCE) state initialization, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly gain privileges via unspecified ioctl calls.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: r128 IOCTL NULL pointer dereferences when CCE state is uninitialised",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "3AS-ELS:kernel-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-0:2.4.21-66.EL.src",
          "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
          "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
          "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386",
          "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386",
          "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-0:2.4.21-66.EL.src",
          "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
          "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
          "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386",
          "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386",
          "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3620"
        },
        {
          "category": "external",
          "summary": "RHBZ#529597",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529597"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3620",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3620"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3620",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3620"
        }
      ],
      "release_date": "2009-08-30T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-11-12T09:36:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
          "product_ids": [
            "3AS-ELS:kernel-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-0:2.4.21-66.EL.src",
            "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-0:2.4.21-66.EL.src",
            "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0882"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.9,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "3AS-ELS:kernel-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-0:2.4.21-66.EL.src",
            "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-0:2.4.21-66.EL.src",
            "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: r128 IOCTL NULL pointer dereferences when CCE state is uninitialised"
    },
    {
      "cve": "CVE-2009-4536",
      "discovery_date": "2009-12-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "552126"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel 2.6.32.3 and earlier handles Ethernet frames that exceed the MTU by processing certain trailing payload data as if it were a complete frame, which allows remote attackers to bypass packet filters via a large packet with a crafted payload.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1385.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: e1000 issue reported at 26c3",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "3AS-ELS:kernel-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-0:2.4.21-66.EL.src",
          "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
          "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
          "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386",
          "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386",
          "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-0:2.4.21-66.EL.src",
          "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
          "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
          "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386",
          "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386",
          "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-4536"
        },
        {
          "category": "external",
          "summary": "RHBZ#552126",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=552126"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-4536",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-4536"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4536",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4536"
        }
      ],
      "release_date": "2009-12-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-11-12T09:36:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
          "product_ids": [
            "3AS-ELS:kernel-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-0:2.4.21-66.EL.src",
            "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-0:2.4.21-66.EL.src",
            "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0882"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.8,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:A/AC:L/Au:N/C:N/I:P/A:C",
            "version": "2.0"
          },
          "products": [
            "3AS-ELS:kernel-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-0:2.4.21-66.EL.src",
            "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-0:2.4.21-66.EL.src",
            "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: e1000 issue reported at 26c3"
    },
    {
      "cve": "CVE-2010-1188",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2010-03-29T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "577711"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Use-after-free vulnerability in net/ipv4/tcp_input.c in the Linux kernel 2.6 before 2.6.20, when IPV6_RECVPKTINFO is set on a listening socket, allows remote attackers to cause a denial of service (kernel panic) via a SYN packet while the socket is in a listening (TCP_LISTEN) state, which is not properly handled and causes the skb structure to be freed.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: ipv6: skb is unexpectedly freed",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the version of the Linux kernel as shipped with Red Hat Enterprise MRG, as it was fixed since version v2.6.20-rc6.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "3AS-ELS:kernel-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-0:2.4.21-66.EL.src",
          "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
          "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
          "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386",
          "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386",
          "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-0:2.4.21-66.EL.src",
          "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
          "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
          "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386",
          "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386",
          "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2010-1188"
        },
        {
          "category": "external",
          "summary": "RHBZ#577711",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=577711"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2010-1188",
          "url": "https://www.cve.org/CVERecord?id=CVE-2010-1188"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-1188",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1188"
        }
      ],
      "release_date": "2007-01-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-11-12T09:36:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
          "product_ids": [
            "3AS-ELS:kernel-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-0:2.4.21-66.EL.src",
            "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-0:2.4.21-66.EL.src",
            "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0882"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.8,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "3AS-ELS:kernel-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-0:2.4.21-66.EL.src",
            "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-0:2.4.21-66.EL.src",
            "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: ipv6: skb is unexpectedly freed"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "X.Org security team"
          ]
        },
        {
          "names": [
            "Rafal Wojtczuk"
          ],
          "summary": "Acknowledged by upstream."
        }
      ],
      "cve": "CVE-2010-2240",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2010-06-21T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "606611"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The do_anonymous_page function in mm/memory.c in the Linux kernel before 2.6.27.52, 2.6.32.x before 2.6.32.19, 2.6.34.x before 2.6.34.4, and 2.6.35.x before 2.6.35.2 does not properly separate the stack and the heap, which allows context-dependent attackers to execute arbitrary code by writing to the bottom page of a shared memory segment, as demonstrated by a memory-exhaustion attack against the X.Org X server.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: mm: keep a guard page below a grow-down stack segment",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "3AS-ELS:kernel-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-0:2.4.21-66.EL.src",
          "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
          "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
          "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386",
          "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386",
          "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-0:2.4.21-66.EL.src",
          "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
          "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
          "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386",
          "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386",
          "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2010-2240"
        },
        {
          "category": "external",
          "summary": "RHBZ#606611",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=606611"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2010-2240",
          "url": "https://www.cve.org/CVERecord?id=CVE-2010-2240"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-2240",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2240"
        }
      ],
      "release_date": "2010-08-13T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-11-12T09:36:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
          "product_ids": [
            "3AS-ELS:kernel-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-0:2.4.21-66.EL.src",
            "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-0:2.4.21-66.EL.src",
            "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0882"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "3AS-ELS:kernel-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-0:2.4.21-66.EL.src",
            "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-0:2.4.21-66.EL.src",
            "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: mm: keep a guard page below a grow-down stack segment"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Ben Hawkes"
          ]
        }
      ],
      "cve": "CVE-2010-3081",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2010-09-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "634457"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The compat_alloc_user_space functions in include/asm/compat.h files in the Linux kernel before 2.6.36-rc4-git2 on 64-bit platforms do not properly allocate the userspace memory required for the 32-bit compatibility layer, which allows local users to gain privileges by leveraging the ability of the compat_mc_getsockopt function (aka the MCAST_MSFILTER getsockopt support) to control a certain length value, related to a \"stack pointer underflow\" issue, as exploited in the wild in September 2010.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: 64-bit Compatibility Mode Stack Pointer Underflow",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "More information can be found in this kbase: https://access.redhat.com/kb/docs/DOC-40265.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "3AS-ELS:kernel-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-0:2.4.21-66.EL.src",
          "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
          "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
          "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386",
          "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386",
          "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-0:2.4.21-66.EL.src",
          "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
          "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
          "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386",
          "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386",
          "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2010-3081"
        },
        {
          "category": "external",
          "summary": "RHBZ#634457",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=634457"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3081",
          "url": "https://www.cve.org/CVERecord?id=CVE-2010-3081"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3081",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3081"
        }
      ],
      "release_date": "2010-09-15T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-11-12T09:36:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
          "product_ids": [
            "3AS-ELS:kernel-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-0:2.4.21-66.EL.src",
            "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-0:2.4.21-66.EL.src",
            "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0882"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "3AS-ELS:kernel-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-0:2.4.21-66.EL.src",
            "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-0:2.4.21-66.EL.src",
            "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: 64-bit Compatibility Mode Stack Pointer Underflow"
    }
  ]
}
  rhsa-2009:1540
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated kernel-rt packages that fix several security issues, multiple bugs,\nand add enhancements are now available for Red Hat Enterprise MRG 1.1.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel-rt packages contain the Linux kernel, the core of any Linux\noperating system.\n\nSecurity fixes:\n\n* the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags were not cleared when a\nsetuid or setgid program was executed. A local, unprivileged user could use\nthis flaw to bypass the mmap_min_addr protection mechanism and perform a\nNULL pointer dereference attack, or bypass the Address Space Layout\nRandomization (ASLR) security feature. (CVE-2009-1895, Important)\n\n* a system with SELinux enforced was more permissive in allowing local\nusers in the unconfined_t domain to map low memory areas even if the\nmmap_min_addr restriction was enabled. This could aid in the local\nexploitation of NULL pointer dereference bugs. (CVE-2009-2695, Important)\n\n* missing initialization flaws were found in getname() implementations in\nnumerous network protocol implementations in the Linux kernel. Certain\ndata structures in these getname() implementations were not initialized\nproperly before being copied to user-space. These flaws could lead to an\ninformation leak. (CVE-2009-3002, Important)\n\n* a NULL pointer dereference flaw was found in each of the following\nfunctions in the Linux kernel: pipe_read_open(), pipe_write_open(), and\npipe_rdwr_open(). When the mutex lock is not held, the i_pipe pointer could\nbe released by other processes before it is used to update the pipe\u0027s\nreader and writer counters. This could lead to a local denial of service or\nprivilege escalation. (CVE-2009-3547, Important)\n\n* a flaw was found in the Realtek r8169 Ethernet driver in the Linux\nkernel. pci_unmap_single() presented a memory leak that could lead to IOMMU\nspace exhaustion and a system crash. An attacker on the local network could\nabuse this flaw by using jumbo frames for large amounts of network traffic.\n(CVE-2009-3613, Important)\n\n* NULL pointer dereference flaws were found in the r128 driver in the\nLinux kernel. Checks to test if the Concurrent Command Engine state was\ninitialized were missing in private IOCTL functions. An attacker could use\nthese flaws to cause a local denial of service or escalate their\nprivileges. (CVE-2009-3620, Important)\n\n* Kees Cook and Steve Beattie discovered a race condition in the /proc\ncode in the Linux kernel. This could lead to information in the\n\"/proc/[pid]/maps\" and \"/proc/[pid]/smaps\" files being leaked to users (who\nwould otherwise not have access to this information) during ELF loading.\nThis could help a local attacker bypass the ASLR security feature.\n(CVE-2009-2691, Moderate)\n\n* a NULL pointer dereference flaw was found in the md driver in the Linux\nkernel. If the suspend_lo or suspend_hi file in \"/sys/\" is modified when\nthe disk array is inactive, it could lead to a local denial of service or\nprivilege escalation. By default, only root can write to these two files.\n(CVE-2009-2849, Moderate)\n\n* an information leak was found in the Linux kernel. On AMD64 systems,\n32-bit processes could access and read certain 64-bit registers by\ntemporarily switching themselves to 64-bit mode. (CVE-2009-2910, Moderate)\n\n* padding data in several core network structures was not initialized\nproperly before being sent to user-space, possibly leading to information\nleaks. (CVE-2009-3228, CVE-2009-3612, Moderate)\n\n* the unix_stream_connect() function in the Linux kernel did not check if a\nUNIX domain socket was in the shutdown state. This could lead to a\ndeadlock. A local, unprivileged user could use this flaw to cause a denial\nof service. (CVE-2009-3621, Moderate)\n\nThese updated packages also include bug fixes and enhancements. Users are\ndirected to the Realtime Security Update Release Notes for version 1.1 for\ninformation on these changes, which will be available shortly from: \n\nhttp://www.redhat.com/docs/en-US/Red_Hat_Enterprise_MRG/\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues and add enhancements. The system must be\nrebooted for this update to take effect.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2009:1540",
        "url": "https://access.redhat.com/errata/RHSA-2009:1540"
      },
      {
        "category": "external",
        "summary": "http://www.redhat.com/security/updates/classification/#important",
        "url": "http://www.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "http://kbase.redhat.com/faq/docs/DOC-18042",
        "url": "http://kbase.redhat.com/faq/docs/DOC-18042"
      },
      {
        "category": "external",
        "summary": "http://kbase.redhat.com/faq/docs/DOC-17866",
        "url": "http://kbase.redhat.com/faq/docs/DOC-17866"
      },
      {
        "category": "external",
        "summary": "529597",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529597"
      },
      {
        "category": "external",
        "summary": "529626",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529626"
      },
      {
        "category": "external",
        "summary": "530490",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=530490"
      },
      {
        "category": "external",
        "summary": "http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_MRG/",
        "url": "http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_MRG/"
      },
      {
        "category": "external",
        "summary": "511171",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=511171"
      },
      {
        "category": "external",
        "summary": "516171",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=516171"
      },
      {
        "category": "external",
        "summary": "517830",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=517830"
      },
      {
        "category": "external",
        "summary": "518132",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=518132"
      },
      {
        "category": "external",
        "summary": "518160",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=518160"
      },
      {
        "category": "external",
        "summary": "519305",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=519305"
      },
      {
        "category": "external",
        "summary": "520990",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=520990"
      },
      {
        "category": "external",
        "summary": "521999",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=521999"
      },
      {
        "category": "external",
        "summary": "522359",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=522359"
      },
      {
        "category": "external",
        "summary": "522501",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=522501"
      },
      {
        "category": "external",
        "summary": "522503",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=522503"
      },
      {
        "category": "external",
        "summary": "523986",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=523986"
      },
      {
        "category": "external",
        "summary": "526788",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=526788"
      },
      {
        "category": "external",
        "summary": "528139",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=528139"
      },
      {
        "category": "external",
        "summary": "528868",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=528868"
      },
      {
        "category": "external",
        "summary": "529137",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529137"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1540.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel-rt security, bug fix, and enhancement update",
    "tracking": {
      "current_release_date": "2025-10-09T13:22:11+00:00",
      "generator": {
        "date": "2025-10-09T13:22:11+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2009:1540",
      "initial_release_date": "2009-11-03T18:21:00+00:00",
      "revision_history": [
        {
          "date": "2009-11-03T18:21:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2009-11-03T13:21:07+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T13:22:11+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "MRG Realtime for RHEL 5 Server",
                "product": {
                  "name": "MRG Realtime for RHEL 5 Server",
                  "product_id": "5Server-MRG-Realtime-1.0",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_mrg:1::el5"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise MRG for RHEL-5"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
                "product": {
                  "name": "kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
                  "product_id": "kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@2.6.24.7-137.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
                "product": {
                  "name": "kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
                  "product_id": "kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@2.6.24.7-137.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
                "product": {
                  "name": "kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
                  "product_id": "kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug@2.6.24.7-137.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
                "product": {
                  "name": "kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
                  "product_id": "kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-devel@2.6.24.7-137.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
                "product": {
                  "name": "kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
                  "product_id": "kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-vanilla@2.6.24.7-137.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
                "product": {
                  "name": "kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
                  "product_id": "kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@2.6.24.7-137.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-0:2.6.24.7-137.el5rt.i686",
                "product": {
                  "name": "kernel-rt-0:2.6.24.7-137.el5rt.i686",
                  "product_id": "kernel-rt-0:2.6.24.7-137.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-137.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
                "product": {
                  "name": "kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
                  "product_id": "kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace@2.6.24.7-137.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
                "product": {
                  "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
                  "product_id": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@2.6.24.7-137.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
                "product": {
                  "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
                  "product_id": "kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@2.6.24.7-137.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
                "product": {
                  "name": "kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
                  "product_id": "kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common@2.6.24.7-137.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
                "product": {
                  "name": "kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
                  "product_id": "kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@2.6.24.7-137.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
                "product": {
                  "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
                  "product_id": "kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@2.6.24.7-137.el5rt?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
                  "product_id": "kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@2.6.24.7-137.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64",
                  "product_id": "kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@2.6.24.7-137.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
                  "product_id": "kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug@2.6.24.7-137.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
                  "product_id": "kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-devel@2.6.24.7-137.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
                  "product_id": "kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-vanilla@2.6.24.7-137.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
                  "product_id": "kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@2.6.24.7-137.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
                  "product_id": "kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-137.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
                  "product_id": "kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace@2.6.24.7-137.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
                  "product_id": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@2.6.24.7-137.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
                  "product_id": "kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@2.6.24.7-137.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
                  "product_id": "kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common@2.6.24.7-137.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
                  "product_id": "kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@2.6.24.7-137.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
                  "product_id": "kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@2.6.24.7-137.el5rt?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
                "product": {
                  "name": "kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
                  "product_id": "kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-doc@2.6.24.7-137.el5rt?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-0:2.6.24.7-137.el5rt.src",
                "product": {
                  "name": "kernel-rt-0:2.6.24.7-137.el5rt.src",
                  "product_id": "kernel-rt-0:2.6.24.7-137.el5rt.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-137.el5rt?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:2.6.24.7-137.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686"
        },
        "product_reference": "kernel-rt-0:2.6.24.7-137.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:2.6.24.7-137.el5rt.src as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src"
        },
        "product_reference": "kernel-rt-0:2.6.24.7-137.el5rt.src",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:2.6.24.7-137.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-0:2.6.24.7-137.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686"
        },
        "product_reference": "kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686"
        },
        "product_reference": "kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686"
        },
        "product_reference": "kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686"
        },
        "product_reference": "kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686"
        },
        "product_reference": "kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-0:2.6.24.7-137.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686"
        },
        "product_reference": "kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch"
        },
        "product_reference": "kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-0:2.6.24.7-137.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686"
        },
        "product_reference": "kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686"
        },
        "product_reference": "kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686"
        },
        "product_reference": "kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686"
        },
        "product_reference": "kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686"
        },
        "product_reference": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686"
        },
        "product_reference": "kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2009-1895",
      "discovery_date": "2009-06-30T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "511171"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The personality subsystem in the Linux kernel before 2.6.31-rc3 has a PER_CLEAR_ON_SETID setting that does not clear the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags when executing a setuid or setgid program, which makes it easier for local users to leverage the details of memory usage to (1) conduct NULL pointer dereference attacks, (2) bypass the mmap_min_addr protection mechanism, or (3) defeat address space layout randomization (ASLR).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: personality: fix PER_CLEAR_ON_SETID",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1895"
        },
        {
          "category": "external",
          "summary": "RHBZ#511171",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=511171"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1895",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1895"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1895",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1895"
        }
      ],
      "release_date": "2009-06-26T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T18:21:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1540"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: personality: fix PER_CLEAR_ON_SETID"
    },
    {
      "cve": "CVE-2009-2691",
      "discovery_date": "2009-08-07T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "516171"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The mm_for_maps function in fs/proc/base.c in the Linux kernel 2.6.30.4 and earlier allows local users to read (1) maps and (2) smaps files under proc/ via vectors related to ELF loading, a setuid process, and a race condition.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: /proc/$pid/maps visible during initial setuid ELF loading",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "We currently have no plans to fix this flaw in Red Hat Enterprise Linux 3, 4, and 5 as it is not possible to trigger the information leak if the suid_dumpable tunable is set to zero (which is the default).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-2691"
        },
        {
          "category": "external",
          "summary": "RHBZ#516171",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=516171"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2691",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-2691"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2691",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2691"
        }
      ],
      "release_date": "2009-07-10T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T18:21:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1540"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: /proc/$pid/maps visible during initial setuid ELF loading"
    },
    {
      "cve": "CVE-2009-2695",
      "discovery_date": "2009-08-17T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "517830"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The Linux kernel before 2.6.31-rc7 does not properly prevent mmap operations that target page zero and other low memory addresses, which allows local users to gain privileges by exploiting NULL pointer dereference vulnerabilities, related to (1) the default configuration of the allow_unconfined_mmap_low boolean in SELinux on Red Hat Enterprise Linux (RHEL) 5, (2) an error that causes allow_unconfined_mmap_low to be ignored in the unconfined_t domain, (3) lack of a requirement for the CAP_SYS_RAWIO capability for these mmap operations, and (4) interaction between the mmap_min_addr protection mechanism and certain application programs.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: SELinux and mmap_min_addr",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-2695"
        },
        {
          "category": "external",
          "summary": "RHBZ#517830",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=517830"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2695",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-2695"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2695",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2695"
        }
      ],
      "release_date": "2009-07-31T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T18:21:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1540"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: SELinux and mmap_min_addr"
    },
    {
      "cve": "CVE-2009-2849",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2009-08-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "518132"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The md driver (drivers/md/md.c) in the Linux kernel before 2.6.30.2 might allow local users to cause a denial of service (NULL pointer dereference) via vectors related to \"suspend_* sysfs attributes\" and the (1) suspend_lo_store or (2) suspend_hi_store functions.  NOTE: this is only a vulnerability when sysfs is writable by an attacker.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: md: NULL pointer deref when accessing suspend_* sysfs attributes",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The flaw was introduced in kernel version 2.6.17-rc1. The Linux kernel as shipped with Red Hat Enterprise Linux 3, and 4 are not affected by this issue.\n\nA future kernel update for Red Hat Enterprise Linux 5 will address this flaw.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-2849"
        },
        {
          "category": "external",
          "summary": "RHBZ#518132",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=518132"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2849",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-2849"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2849",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2849"
        }
      ],
      "release_date": "2009-07-01T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T18:21:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1540"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "HIGH",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.2,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: md: NULL pointer deref when accessing suspend_* sysfs attributes"
    },
    {
      "cve": "CVE-2009-2910",
      "discovery_date": "2009-10-01T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "526788"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "arch/x86/ia32/ia32entry.S in the Linux kernel before 2.6.31.4 on the x86_64 platform does not clear certain kernel registers before a return to user mode, which allows local users to read register values from an earlier process by switching an ia32 process to 64-bit mode.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: x86_64 32 bit process register leak",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is not planned to be fixed in Red Hat Enterprise Linux 3, due to this product being in Production 3 of its maintenance life-cycle, where only qualified security errata of important and critical impact are addressed.\n\nFor further information about Errata Support Policy, visit: https://access.redhat.com/support/policy/updates/errata/",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-2910"
        },
        {
          "category": "external",
          "summary": "RHBZ#526788",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=526788"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2910",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-2910"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2910",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2910"
        }
      ],
      "release_date": "2009-10-01T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T18:21:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1540"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: x86_64 32 bit process register leak"
    },
    {
      "cve": "CVE-2009-3002",
      "discovery_date": "2009-08-26T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "519305"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The Linux kernel before 2.6.31-rc7 does not initialize certain data structures within getname functions, which allows local users to read the contents of some kernel memory locations by calling getsockname on (1) an AF_APPLETALK socket, related to the atalk_getname function in net/appletalk/ddp.c; (2) an AF_IRDA socket, related to the irda_getname function in net/irda/af_irda.c; (3) an AF_ECONET socket, related to the econet_getname function in net/econet/af_econet.c; (4) an AF_NETROM socket, related to the nr_getname function in net/netrom/af_netrom.c; (5) an AF_ROSE socket, related to the rose_getname function in net/rose/af_rose.c; or (6) a raw CAN socket, related to the raw_getname function in net/can/raw.c.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: numerous getname() infoleaks",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "CVE-2009-3002 describes a collection of similar information leaks that affect numerous networking protocols.\n\nThe Linux kernel as shipped with Red Hat Enterprise Linux 4 and 5 did not enable support for the AppleTalk DDP protocol, and therefore were not affected by issue (1).\n\nThe Linux kernel as shipped with Red Hat Enterprise Linux 4, 5 and Red Hat Enterprise MRG did not enable support for IrDA sockets, and therefore were not affected by issue (2).\n\nThe Linux kernel as shipped with Red Hat Enterprise Linux 3, 4, 5, and Red Hat Enterprise MRG did not enable support for the Acorn Econet and AUN protocols, and therefore were not affected by issue (3).\n\nThe Linux kernel as shipped with Red Hat Enterprise Linux 4, 5, and Red Hat Enterprise MRG did not enable support for the NET/ROM and ROSE protocols, and therefore were not affected by issues (4) and (5).\n\nThe raw_getname() leak was introduced in the Linux kernel version 2.6.25-rc1. The Linux kernel as shipped with Red Hat Enterprise Linux 3, 4, 5, and Red Hat Enterprise MRG therefore were not affected by issue (6).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3002"
        },
        {
          "category": "external",
          "summary": "RHBZ#519305",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=519305"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3002",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3002"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3002",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3002"
        }
      ],
      "release_date": "2009-08-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T18:21:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1540"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: numerous getname() infoleaks"
    },
    {
      "cve": "CVE-2009-3228",
      "cwe": {
        "id": "CWE-401",
        "name": "Missing Release of Memory after Effective Lifetime"
      },
      "discovery_date": "2009-09-03T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "520990"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The tc_fill_tclass function in net/sched/sch_api.c in the tc subsystem in the Linux kernel 2.4.x before 2.4.37.6 and 2.6.x before 2.6.31-rc9 does not initialize certain (1) tcm__pad1 and (2) tcm__pad2 structure members, which might allow local users to obtain sensitive information from kernel memory via unspecified vectors.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: tc: uninitialised kernel memory leak",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3228"
        },
        {
          "category": "external",
          "summary": "RHBZ#520990",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=520990"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3228",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3228"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3228",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3228"
        }
      ],
      "release_date": "2009-09-02T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T18:21:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1540"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: tc: uninitialised kernel memory leak"
    },
    {
      "cve": "CVE-2009-3547",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2009-10-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "530490"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Multiple race conditions in fs/pipe.c in the Linux kernel before 2.6.32-rc6 allow local users to cause a denial of service (NULL pointer dereference and system crash) or gain privileges by attempting to open an anonymous pipe via a /proc/*/fd/ pathname.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: fs: pipe.c null pointer dereference",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3547"
        },
        {
          "category": "external",
          "summary": "RHBZ#530490",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=530490"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3547",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3547"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3547",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3547"
        }
      ],
      "release_date": "2009-10-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T18:21:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1540"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: fs: pipe.c null pointer dereference"
    },
    {
      "cve": "CVE-2009-3612",
      "discovery_date": "2009-10-14T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "528868"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The tcf_fill_node function in net/sched/cls_api.c in the netlink subsystem in the Linux kernel 2.6.x before 2.6.32-rc5, and 2.4.37.6 and earlier, does not initialize a certain tcm__pad2 structure member, which might allow local users to obtain sensitive information from kernel memory via unspecified vectors.  NOTE: this issue exists because of an incomplete fix for CVE-2005-4881.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: tcf_fill_node() infoleak due to typo in 9ef1d4c7",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is not planned to be fixed in Red Hat Enterprise Linux 3 due to this product being in Production 3 of its maintenance life-cycle, where only qualified security errata of important or critical impact are addressed.\n\nFor further information about the Errata Support Policy, visit: https://access.redhat.com/support/policy/updates/errata/",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3612"
        },
        {
          "category": "external",
          "summary": "RHBZ#528868",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=528868"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3612",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3612"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3612",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3612"
        }
      ],
      "release_date": "2009-10-08T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T18:21:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1540"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: tcf_fill_node() infoleak due to typo in 9ef1d4c7"
    },
    {
      "cve": "CVE-2009-3613",
      "discovery_date": "2009-10-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "529137"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The swiotlb functionality in the r8169 driver in drivers/net/r8169.c in the Linux kernel before 2.6.27.22 allows remote attackers to cause a denial of service (IOMMU space exhaustion and system crash) by using jumbo frames for a large amount of network traffic, as demonstrated by a flood ping.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: flood ping cause out-of-iommu error and panic when mtu larger than 1500",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3613"
        },
        {
          "category": "external",
          "summary": "RHBZ#529137",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529137"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3613",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3613"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3613",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3613"
        }
      ],
      "release_date": "2007-11-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T18:21:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1540"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: flood ping cause out-of-iommu error and panic when mtu larger than 1500"
    },
    {
      "cve": "CVE-2009-3620",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2009-10-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "529597"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The ATI Rage 128 (aka r128) driver in the Linux kernel before 2.6.31-git11 does not properly verify Concurrent Command Engine (CCE) state initialization, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly gain privileges via unspecified ioctl calls.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: r128 IOCTL NULL pointer dereferences when CCE state is uninitialised",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3620"
        },
        {
          "category": "external",
          "summary": "RHBZ#529597",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529597"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3620",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3620"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3620",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3620"
        }
      ],
      "release_date": "2009-08-30T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T18:21:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1540"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.9,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: r128 IOCTL NULL pointer dereferences when CCE state is uninitialised"
    },
    {
      "cve": "CVE-2009-3621",
      "discovery_date": "2009-10-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "529626"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "net/unix/af_unix.c in the Linux kernel 2.6.31.4 and earlier allows local users to cause a denial of service (system hang) by creating an abstract-namespace AF_UNIX listening socket, performing a shutdown operation on this socket, and then performing a series of connect operations to this socket.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: AF_UNIX: Fix deadlock on connecting to shutdown socket",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is not planned to be fixed in Red Hat Enterprise Linux 3, due to this product being in Production 3 of its maintenance life-cycle, where only qualified security errata of important or critical impact are addressed.\n\nFor further information about Errata Support Policy, visit: https://access.redhat.com/support/policy/updates/errata/",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3621"
        },
        {
          "category": "external",
          "summary": "RHBZ#529626",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529626"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3621",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3621"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3621",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3621"
        }
      ],
      "release_date": "2009-10-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T18:21:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1540"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.9,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-137.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-137.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-137.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: AF_UNIX: Fix deadlock on connecting to shutdown socket"
    }
  ]
}
  RHSA-2009:1671
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated kernel packages that fix multiple security issues and several bugs\nare now available for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues:\n\n* a flaw was found in the Realtek r8169 Ethernet driver in the Linux\nkernel. pci_unmap_single() presented a memory leak that could lead to IOMMU\nspace exhaustion and a system crash. An attacker on the local network could\ntrigger this flaw by using jumbo frames for large amounts of network\ntraffic. (CVE-2009-3613, Important)\n\n* NULL pointer dereference flaws were found in the r128 driver in the Linux\nkernel. Checks to test if the Concurrent Command Engine state was\ninitialized were missing in private IOCTL functions. An attacker could use\nthese flaws to cause a local denial of service or escalate their\nprivileges. (CVE-2009-3620, Important)\n\n* an information leak was found in the Linux kernel. On AMD64 systems,\n32-bit processes could access and read certain 64-bit registers by\ntemporarily switching themselves to 64-bit mode. (CVE-2009-2910, Moderate)\n\n* the unix_stream_connect() function in the Linux kernel did not check if a\nUNIX domain socket was in the shutdown state. This could lead to a\ndeadlock. A local, unprivileged user could use this flaw to cause a denial\nof service. (CVE-2009-3621, Moderate)\n\nThis update also fixes the following bugs:\n\n* an iptables rule with the recent module and a hit count value greater\nthan the ip_pkt_list_tot parameter (the default is 20), did not have any\neffect over packets, as the hit count could not be reached. (BZ#529306)\n\n* in environments that use dual-controller storage devices with the cciss\ndriver, Device-Mapper Multipath maps could not be detected and configured,\ndue to the cciss driver not exporting the bus attribute via sysfs. This\nattribute is now exported. (BZ#529309)\n\n* the kernel crashed with a divide error when a certain joystick was\nattached. (BZ#532027)\n\n* a bug in the mptctl_do_mpt_command() function in the mpt driver may have\nresulted in crashes during boot on i386 systems with certain adapters using\nthe mpt driver, and also running the hugemem kernel. (BZ#533798)\n\n* on certain hardware, the igb driver was unable to detect link statuses\ncorrectly. This may have caused problems for network bonding, such as\nfailover not occurring. (BZ#534105)\n\n* the RHSA-2009:1024 update introduced a regression. After updating to Red\nHat Enterprise Linux 4.8 and rebooting, network links often failed to be\nbrought up for interfaces using the forcedeth driver. \"no link during\ninitialization\" messages may have been logged. (BZ#534112)\n\n* the RHSA-2009:1024 update introduced a second regression. On certain\nsystems, PS/2 keyboards failed to work. (BZ#537344)\n\n* a bug in checksum offload calculations could have crashed the bnx2x\nfirmware when the iptable_nat module was loaded, causing network traffic\nto stop. (BZ#537013)\n\n* a check has been added to the IPv4 code to make sure that the routing\ntable data structure, rt, is not NULL, to help prevent future bugs in\nfunctions that call ip_append_data() from being exploitable. (BZ#537016)\n\n* possible kernel pointer dereferences on systems with several NFS mounts\n(a mixture of \"-o lock\" and \"-o nolock\"), which in rare cases may have\ncaused a system crash, have been resolved. (BZ#537017)\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2009:1671",
        "url": "https://access.redhat.com/errata/RHSA-2009:1671"
      },
      {
        "category": "external",
        "summary": "532027",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=532027"
      },
      {
        "category": "external",
        "summary": "533798",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533798"
      },
      {
        "category": "external",
        "summary": "534105",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=534105"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "526788",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=526788"
      },
      {
        "category": "external",
        "summary": "529137",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529137"
      },
      {
        "category": "external",
        "summary": "529306",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529306"
      },
      {
        "category": "external",
        "summary": "529309",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529309"
      },
      {
        "category": "external",
        "summary": "529597",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529597"
      },
      {
        "category": "external",
        "summary": "529626",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529626"
      },
      {
        "category": "external",
        "summary": "534112",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=534112"
      },
      {
        "category": "external",
        "summary": "537013",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=537013"
      },
      {
        "category": "external",
        "summary": "537016",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=537016"
      },
      {
        "category": "external",
        "summary": "537017",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=537017"
      },
      {
        "category": "external",
        "summary": "537344",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=537344"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1671.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security and bug fix update",
    "tracking": {
      "current_release_date": "2025-10-09T13:22:13+00:00",
      "generator": {
        "date": "2025-10-09T13:22:13+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2009:1671",
      "initial_release_date": "2009-12-15T17:12:00+00:00",
      "revision_history": [
        {
          "date": "2009-12-15T17:12:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2009-12-15T12:18:22+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T13:22:13+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AS version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux AS version 4",
                  "product_id": "4AS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::as"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Desktop version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux Desktop version 4",
                  "product_id": "4Desktop",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux ES version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux ES version 4",
                  "product_id": "4ES",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::es"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux WS version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux WS version 4",
                  "product_id": "4WS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
                  "product_id": "kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.18.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
                "product": {
                  "name": "kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
                  "product_id": "kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-hugemem@2.6.9-89.0.18.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-89.0.18.EL.i686",
                "product": {
                  "name": "kernel-devel-0:2.6.9-89.0.18.EL.i686",
                  "product_id": "kernel-devel-0:2.6.9-89.0.18.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.18.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
                "product": {
                  "name": "kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
                  "product_id": "kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-89.0.18.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
                "product": {
                  "name": "kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
                  "product_id": "kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-hugemem-devel@2.6.9-89.0.18.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
                "product": {
                  "name": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
                  "product_id": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xenU-devel@2.6.9-89.0.18.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-89.0.18.EL.i686",
                "product": {
                  "name": "kernel-0:2.6.9-89.0.18.EL.i686",
                  "product_id": "kernel-0:2.6.9-89.0.18.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.18.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-smp-0:2.6.9-89.0.18.EL.i686",
                "product": {
                  "name": "kernel-smp-0:2.6.9-89.0.18.EL.i686",
                  "product_id": "kernel-smp-0:2.6.9-89.0.18.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-smp@2.6.9-89.0.18.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xenU-0:2.6.9-89.0.18.EL.i686",
                "product": {
                  "name": "kernel-xenU-0:2.6.9-89.0.18.EL.i686",
                  "product_id": "kernel-xenU-0:2.6.9-89.0.18.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xenU@2.6.9-89.0.18.EL?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
                  "product_id": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.18.EL?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
                "product": {
                  "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
                  "product_id": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-89.0.18.EL?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-89.0.18.EL.ia64",
                "product": {
                  "name": "kernel-devel-0:2.6.9-89.0.18.EL.ia64",
                  "product_id": "kernel-devel-0:2.6.9-89.0.18.EL.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.18.EL?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-89.0.18.EL.ia64",
                "product": {
                  "name": "kernel-0:2.6.9-89.0.18.EL.ia64",
                  "product_id": "kernel-0:2.6.9-89.0.18.EL.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.18.EL?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
                "product": {
                  "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
                  "product_id": "kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-89.0.18.EL?arch=ia64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ia64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
                  "product_id": "kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.18.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
                "product": {
                  "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
                  "product_id": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-89.0.18.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
                "product": {
                  "name": "kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
                  "product_id": "kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.18.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
                "product": {
                  "name": "kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
                  "product_id": "kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-89.0.18.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
                "product": {
                  "name": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
                  "product_id": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xenU-devel@2.6.9-89.0.18.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-89.0.18.EL.x86_64",
                "product": {
                  "name": "kernel-0:2.6.9-89.0.18.EL.x86_64",
                  "product_id": "kernel-0:2.6.9-89.0.18.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.18.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
                "product": {
                  "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
                  "product_id": "kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-89.0.18.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
                "product": {
                  "name": "kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
                  "product_id": "kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-smp@2.6.9-89.0.18.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
                "product": {
                  "name": "kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
                  "product_id": "kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xenU@2.6.9-89.0.18.EL?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-89.0.18.EL.src",
                "product": {
                  "name": "kernel-0:2.6.9-89.0.18.EL.src",
                  "product_id": "kernel-0:2.6.9-89.0.18.EL.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.18.EL?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-doc-0:2.6.9-89.0.18.EL.noarch",
                "product": {
                  "name": "kernel-doc-0:2.6.9-89.0.18.EL.noarch",
                  "product_id": "kernel-doc-0:2.6.9-89.0.18.EL.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@2.6.9-89.0.18.EL?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
                  "product_id": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.18.EL?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
                "product": {
                  "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
                  "product_id": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-89.0.18.EL?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
                "product": {
                  "name": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
                  "product_id": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.18.EL?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-89.0.18.EL.ppc64",
                "product": {
                  "name": "kernel-0:2.6.9-89.0.18.EL.ppc64",
                  "product_id": "kernel-0:2.6.9-89.0.18.EL.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.18.EL?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
                "product": {
                  "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
                  "product_id": "kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-89.0.18.EL?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
                  "product_id": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.18.EL?arch=ppc64iseries"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
                "product": {
                  "name": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
                  "product_id": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.18.EL?arch=ppc64iseries"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
                "product": {
                  "name": "kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
                  "product_id": "kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.18.EL?arch=ppc64iseries"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64iseries"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
                  "product_id": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.18.EL?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-89.0.18.EL.s390x",
                "product": {
                  "name": "kernel-devel-0:2.6.9-89.0.18.EL.s390x",
                  "product_id": "kernel-devel-0:2.6.9-89.0.18.EL.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.18.EL?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-89.0.18.EL.s390x",
                "product": {
                  "name": "kernel-0:2.6.9-89.0.18.EL.s390x",
                  "product_id": "kernel-0:2.6.9-89.0.18.EL.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.18.EL?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
                  "product_id": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.18.EL?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-89.0.18.EL.s390",
                "product": {
                  "name": "kernel-devel-0:2.6.9-89.0.18.EL.s390",
                  "product_id": "kernel-devel-0:2.6.9-89.0.18.EL.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.18.EL?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-89.0.18.EL.s390",
                "product": {
                  "name": "kernel-0:2.6.9-89.0.18.EL.s390",
                  "product_id": "kernel-0:2.6.9-89.0.18.EL.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.18.EL?arch=s390"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.s390 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-89.0.18.EL.s390"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.s390",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.s390x as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-89.0.18.EL.s390x"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.s390x",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.src as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-89.0.18.EL.src"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.src",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.s390 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.s390",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.s390x as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.s390x",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.9-89.0.18.EL.noarch as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-doc-0:2.6.9-89.0.18.EL.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.9-89.0.18.EL.noarch",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-smp-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-smp-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-xenU-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64iseries"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.s390",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390x"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.s390x",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.src as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-89.0.18.EL.src"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.src",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.s390",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.s390x",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.9-89.0.18.EL.noarch as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-doc-0:2.6.9-89.0.18.EL.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.9-89.0.18.EL.noarch",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-hugemem-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-smp-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-xenU-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64iseries"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.s390 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-89.0.18.EL.s390"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.s390",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.s390x as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-89.0.18.EL.s390x"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.s390x",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.src as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-89.0.18.EL.src"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.src",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.s390 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.s390",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.s390x as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.s390x",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.9-89.0.18.EL.noarch as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-doc-0:2.6.9-89.0.18.EL.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.9-89.0.18.EL.noarch",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-hugemem-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-smp-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-smp-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-smp-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-xenU-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.s390 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-89.0.18.EL.s390"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.s390",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.s390x as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-89.0.18.EL.s390x"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.s390x",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.src as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-89.0.18.EL.src"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.src",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.s390 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.s390",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.s390x as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.s390x",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.9-89.0.18.EL.noarch as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-doc-0:2.6.9-89.0.18.EL.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.9-89.0.18.EL.noarch",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-smp-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-smp-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-xenU-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4WS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2009-2910",
      "discovery_date": "2009-10-01T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "526788"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "arch/x86/ia32/ia32entry.S in the Linux kernel before 2.6.31.4 on the x86_64 platform does not clear certain kernel registers before a return to user mode, which allows local users to read register values from an earlier process by switching an ia32 process to 64-bit mode.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: x86_64 32 bit process register leak",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is not planned to be fixed in Red Hat Enterprise Linux 3, due to this product being in Production 3 of its maintenance life-cycle, where only qualified security errata of important and critical impact are addressed.\n\nFor further information about Errata Support Policy, visit: https://access.redhat.com/support/policy/updates/errata/",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:kernel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4AS:kernel-0:2.6.9-89.0.18.EL.s390",
          "4AS:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4AS:kernel-0:2.6.9-89.0.18.EL.src",
          "4AS:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4AS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.src",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4Desktop:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4ES:kernel-0:2.6.9-89.0.18.EL.s390",
          "4ES:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4ES:kernel-0:2.6.9-89.0.18.EL.src",
          "4ES:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4ES:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4WS:kernel-0:2.6.9-89.0.18.EL.s390",
          "4WS:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4WS:kernel-0:2.6.9-89.0.18.EL.src",
          "4WS:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4WS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-2910"
        },
        {
          "category": "external",
          "summary": "RHBZ#526788",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=526788"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2910",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-2910"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2910",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2910"
        }
      ],
      "release_date": "2009-10-01T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-12-15T17:12:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-0:2.6.9-89.0.18.EL.src",
            "4AS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.src",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-0:2.6.9-89.0.18.EL.src",
            "4ES:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-0:2.6.9-89.0.18.EL.src",
            "4WS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1671"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "products": [
            "4AS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-0:2.6.9-89.0.18.EL.src",
            "4AS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.src",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-0:2.6.9-89.0.18.EL.src",
            "4ES:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-0:2.6.9-89.0.18.EL.src",
            "4WS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: x86_64 32 bit process register leak"
    },
    {
      "cve": "CVE-2009-3613",
      "discovery_date": "2009-10-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "529137"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The swiotlb functionality in the r8169 driver in drivers/net/r8169.c in the Linux kernel before 2.6.27.22 allows remote attackers to cause a denial of service (IOMMU space exhaustion and system crash) by using jumbo frames for a large amount of network traffic, as demonstrated by a flood ping.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: flood ping cause out-of-iommu error and panic when mtu larger than 1500",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:kernel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4AS:kernel-0:2.6.9-89.0.18.EL.s390",
          "4AS:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4AS:kernel-0:2.6.9-89.0.18.EL.src",
          "4AS:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4AS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.src",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4Desktop:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4ES:kernel-0:2.6.9-89.0.18.EL.s390",
          "4ES:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4ES:kernel-0:2.6.9-89.0.18.EL.src",
          "4ES:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4ES:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4WS:kernel-0:2.6.9-89.0.18.EL.s390",
          "4WS:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4WS:kernel-0:2.6.9-89.0.18.EL.src",
          "4WS:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4WS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3613"
        },
        {
          "category": "external",
          "summary": "RHBZ#529137",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529137"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3613",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3613"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3613",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3613"
        }
      ],
      "release_date": "2007-11-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-12-15T17:12:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-0:2.6.9-89.0.18.EL.src",
            "4AS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.src",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-0:2.6.9-89.0.18.EL.src",
            "4ES:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-0:2.6.9-89.0.18.EL.src",
            "4WS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1671"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "4AS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-0:2.6.9-89.0.18.EL.src",
            "4AS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.src",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-0:2.6.9-89.0.18.EL.src",
            "4ES:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-0:2.6.9-89.0.18.EL.src",
            "4WS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: flood ping cause out-of-iommu error and panic when mtu larger than 1500"
    },
    {
      "cve": "CVE-2009-3620",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2009-10-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "529597"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The ATI Rage 128 (aka r128) driver in the Linux kernel before 2.6.31-git11 does not properly verify Concurrent Command Engine (CCE) state initialization, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly gain privileges via unspecified ioctl calls.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: r128 IOCTL NULL pointer dereferences when CCE state is uninitialised",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:kernel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4AS:kernel-0:2.6.9-89.0.18.EL.s390",
          "4AS:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4AS:kernel-0:2.6.9-89.0.18.EL.src",
          "4AS:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4AS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.src",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4Desktop:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4ES:kernel-0:2.6.9-89.0.18.EL.s390",
          "4ES:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4ES:kernel-0:2.6.9-89.0.18.EL.src",
          "4ES:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4ES:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4WS:kernel-0:2.6.9-89.0.18.EL.s390",
          "4WS:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4WS:kernel-0:2.6.9-89.0.18.EL.src",
          "4WS:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4WS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3620"
        },
        {
          "category": "external",
          "summary": "RHBZ#529597",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529597"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3620",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3620"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3620",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3620"
        }
      ],
      "release_date": "2009-08-30T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-12-15T17:12:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-0:2.6.9-89.0.18.EL.src",
            "4AS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.src",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-0:2.6.9-89.0.18.EL.src",
            "4ES:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-0:2.6.9-89.0.18.EL.src",
            "4WS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1671"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.9,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "4AS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-0:2.6.9-89.0.18.EL.src",
            "4AS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.src",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-0:2.6.9-89.0.18.EL.src",
            "4ES:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-0:2.6.9-89.0.18.EL.src",
            "4WS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: r128 IOCTL NULL pointer dereferences when CCE state is uninitialised"
    },
    {
      "cve": "CVE-2009-3621",
      "discovery_date": "2009-10-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "529626"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "net/unix/af_unix.c in the Linux kernel 2.6.31.4 and earlier allows local users to cause a denial of service (system hang) by creating an abstract-namespace AF_UNIX listening socket, performing a shutdown operation on this socket, and then performing a series of connect operations to this socket.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: AF_UNIX: Fix deadlock on connecting to shutdown socket",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is not planned to be fixed in Red Hat Enterprise Linux 3, due to this product being in Production 3 of its maintenance life-cycle, where only qualified security errata of important or critical impact are addressed.\n\nFor further information about Errata Support Policy, visit: https://access.redhat.com/support/policy/updates/errata/",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:kernel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4AS:kernel-0:2.6.9-89.0.18.EL.s390",
          "4AS:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4AS:kernel-0:2.6.9-89.0.18.EL.src",
          "4AS:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4AS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.src",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4Desktop:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4ES:kernel-0:2.6.9-89.0.18.EL.s390",
          "4ES:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4ES:kernel-0:2.6.9-89.0.18.EL.src",
          "4ES:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4ES:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4WS:kernel-0:2.6.9-89.0.18.EL.s390",
          "4WS:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4WS:kernel-0:2.6.9-89.0.18.EL.src",
          "4WS:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4WS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3621"
        },
        {
          "category": "external",
          "summary": "RHBZ#529626",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529626"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3621",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3621"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3621",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3621"
        }
      ],
      "release_date": "2009-10-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-12-15T17:12:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-0:2.6.9-89.0.18.EL.src",
            "4AS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.src",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-0:2.6.9-89.0.18.EL.src",
            "4ES:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-0:2.6.9-89.0.18.EL.src",
            "4WS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1671"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.9,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "4AS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-0:2.6.9-89.0.18.EL.src",
            "4AS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.src",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-0:2.6.9-89.0.18.EL.src",
            "4ES:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-0:2.6.9-89.0.18.EL.src",
            "4WS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: AF_UNIX: Fix deadlock on connecting to shutdown socket"
    }
  ]
}
  rhsa-2009:1671
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated kernel packages that fix multiple security issues and several bugs\nare now available for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues:\n\n* a flaw was found in the Realtek r8169 Ethernet driver in the Linux\nkernel. pci_unmap_single() presented a memory leak that could lead to IOMMU\nspace exhaustion and a system crash. An attacker on the local network could\ntrigger this flaw by using jumbo frames for large amounts of network\ntraffic. (CVE-2009-3613, Important)\n\n* NULL pointer dereference flaws were found in the r128 driver in the Linux\nkernel. Checks to test if the Concurrent Command Engine state was\ninitialized were missing in private IOCTL functions. An attacker could use\nthese flaws to cause a local denial of service or escalate their\nprivileges. (CVE-2009-3620, Important)\n\n* an information leak was found in the Linux kernel. On AMD64 systems,\n32-bit processes could access and read certain 64-bit registers by\ntemporarily switching themselves to 64-bit mode. (CVE-2009-2910, Moderate)\n\n* the unix_stream_connect() function in the Linux kernel did not check if a\nUNIX domain socket was in the shutdown state. This could lead to a\ndeadlock. A local, unprivileged user could use this flaw to cause a denial\nof service. (CVE-2009-3621, Moderate)\n\nThis update also fixes the following bugs:\n\n* an iptables rule with the recent module and a hit count value greater\nthan the ip_pkt_list_tot parameter (the default is 20), did not have any\neffect over packets, as the hit count could not be reached. (BZ#529306)\n\n* in environments that use dual-controller storage devices with the cciss\ndriver, Device-Mapper Multipath maps could not be detected and configured,\ndue to the cciss driver not exporting the bus attribute via sysfs. This\nattribute is now exported. (BZ#529309)\n\n* the kernel crashed with a divide error when a certain joystick was\nattached. (BZ#532027)\n\n* a bug in the mptctl_do_mpt_command() function in the mpt driver may have\nresulted in crashes during boot on i386 systems with certain adapters using\nthe mpt driver, and also running the hugemem kernel. (BZ#533798)\n\n* on certain hardware, the igb driver was unable to detect link statuses\ncorrectly. This may have caused problems for network bonding, such as\nfailover not occurring. (BZ#534105)\n\n* the RHSA-2009:1024 update introduced a regression. After updating to Red\nHat Enterprise Linux 4.8 and rebooting, network links often failed to be\nbrought up for interfaces using the forcedeth driver. \"no link during\ninitialization\" messages may have been logged. (BZ#534112)\n\n* the RHSA-2009:1024 update introduced a second regression. On certain\nsystems, PS/2 keyboards failed to work. (BZ#537344)\n\n* a bug in checksum offload calculations could have crashed the bnx2x\nfirmware when the iptable_nat module was loaded, causing network traffic\nto stop. (BZ#537013)\n\n* a check has been added to the IPv4 code to make sure that the routing\ntable data structure, rt, is not NULL, to help prevent future bugs in\nfunctions that call ip_append_data() from being exploitable. (BZ#537016)\n\n* possible kernel pointer dereferences on systems with several NFS mounts\n(a mixture of \"-o lock\" and \"-o nolock\"), which in rare cases may have\ncaused a system crash, have been resolved. (BZ#537017)\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2009:1671",
        "url": "https://access.redhat.com/errata/RHSA-2009:1671"
      },
      {
        "category": "external",
        "summary": "532027",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=532027"
      },
      {
        "category": "external",
        "summary": "533798",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533798"
      },
      {
        "category": "external",
        "summary": "534105",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=534105"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "526788",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=526788"
      },
      {
        "category": "external",
        "summary": "529137",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529137"
      },
      {
        "category": "external",
        "summary": "529306",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529306"
      },
      {
        "category": "external",
        "summary": "529309",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529309"
      },
      {
        "category": "external",
        "summary": "529597",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529597"
      },
      {
        "category": "external",
        "summary": "529626",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529626"
      },
      {
        "category": "external",
        "summary": "534112",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=534112"
      },
      {
        "category": "external",
        "summary": "537013",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=537013"
      },
      {
        "category": "external",
        "summary": "537016",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=537016"
      },
      {
        "category": "external",
        "summary": "537017",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=537017"
      },
      {
        "category": "external",
        "summary": "537344",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=537344"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1671.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security and bug fix update",
    "tracking": {
      "current_release_date": "2025-10-09T13:22:13+00:00",
      "generator": {
        "date": "2025-10-09T13:22:13+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2009:1671",
      "initial_release_date": "2009-12-15T17:12:00+00:00",
      "revision_history": [
        {
          "date": "2009-12-15T17:12:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2009-12-15T12:18:22+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T13:22:13+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AS version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux AS version 4",
                  "product_id": "4AS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::as"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Desktop version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux Desktop version 4",
                  "product_id": "4Desktop",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux ES version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux ES version 4",
                  "product_id": "4ES",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::es"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux WS version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux WS version 4",
                  "product_id": "4WS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
                  "product_id": "kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.18.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
                "product": {
                  "name": "kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
                  "product_id": "kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-hugemem@2.6.9-89.0.18.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-89.0.18.EL.i686",
                "product": {
                  "name": "kernel-devel-0:2.6.9-89.0.18.EL.i686",
                  "product_id": "kernel-devel-0:2.6.9-89.0.18.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.18.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
                "product": {
                  "name": "kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
                  "product_id": "kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-89.0.18.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
                "product": {
                  "name": "kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
                  "product_id": "kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-hugemem-devel@2.6.9-89.0.18.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
                "product": {
                  "name": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
                  "product_id": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xenU-devel@2.6.9-89.0.18.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-89.0.18.EL.i686",
                "product": {
                  "name": "kernel-0:2.6.9-89.0.18.EL.i686",
                  "product_id": "kernel-0:2.6.9-89.0.18.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.18.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-smp-0:2.6.9-89.0.18.EL.i686",
                "product": {
                  "name": "kernel-smp-0:2.6.9-89.0.18.EL.i686",
                  "product_id": "kernel-smp-0:2.6.9-89.0.18.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-smp@2.6.9-89.0.18.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xenU-0:2.6.9-89.0.18.EL.i686",
                "product": {
                  "name": "kernel-xenU-0:2.6.9-89.0.18.EL.i686",
                  "product_id": "kernel-xenU-0:2.6.9-89.0.18.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xenU@2.6.9-89.0.18.EL?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
                  "product_id": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.18.EL?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
                "product": {
                  "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
                  "product_id": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-89.0.18.EL?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-89.0.18.EL.ia64",
                "product": {
                  "name": "kernel-devel-0:2.6.9-89.0.18.EL.ia64",
                  "product_id": "kernel-devel-0:2.6.9-89.0.18.EL.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.18.EL?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-89.0.18.EL.ia64",
                "product": {
                  "name": "kernel-0:2.6.9-89.0.18.EL.ia64",
                  "product_id": "kernel-0:2.6.9-89.0.18.EL.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.18.EL?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
                "product": {
                  "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
                  "product_id": "kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-89.0.18.EL?arch=ia64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ia64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
                  "product_id": "kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.18.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
                "product": {
                  "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
                  "product_id": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-89.0.18.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
                "product": {
                  "name": "kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
                  "product_id": "kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.18.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
                "product": {
                  "name": "kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
                  "product_id": "kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-89.0.18.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
                "product": {
                  "name": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
                  "product_id": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xenU-devel@2.6.9-89.0.18.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-89.0.18.EL.x86_64",
                "product": {
                  "name": "kernel-0:2.6.9-89.0.18.EL.x86_64",
                  "product_id": "kernel-0:2.6.9-89.0.18.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.18.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
                "product": {
                  "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
                  "product_id": "kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-89.0.18.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
                "product": {
                  "name": "kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
                  "product_id": "kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-smp@2.6.9-89.0.18.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
                "product": {
                  "name": "kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
                  "product_id": "kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xenU@2.6.9-89.0.18.EL?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-89.0.18.EL.src",
                "product": {
                  "name": "kernel-0:2.6.9-89.0.18.EL.src",
                  "product_id": "kernel-0:2.6.9-89.0.18.EL.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.18.EL?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-doc-0:2.6.9-89.0.18.EL.noarch",
                "product": {
                  "name": "kernel-doc-0:2.6.9-89.0.18.EL.noarch",
                  "product_id": "kernel-doc-0:2.6.9-89.0.18.EL.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@2.6.9-89.0.18.EL?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
                  "product_id": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.18.EL?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
                "product": {
                  "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
                  "product_id": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-89.0.18.EL?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
                "product": {
                  "name": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
                  "product_id": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.18.EL?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-89.0.18.EL.ppc64",
                "product": {
                  "name": "kernel-0:2.6.9-89.0.18.EL.ppc64",
                  "product_id": "kernel-0:2.6.9-89.0.18.EL.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.18.EL?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
                "product": {
                  "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
                  "product_id": "kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-89.0.18.EL?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
                  "product_id": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.18.EL?arch=ppc64iseries"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
                "product": {
                  "name": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
                  "product_id": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.18.EL?arch=ppc64iseries"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
                "product": {
                  "name": "kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
                  "product_id": "kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.18.EL?arch=ppc64iseries"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64iseries"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
                  "product_id": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.18.EL?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-89.0.18.EL.s390x",
                "product": {
                  "name": "kernel-devel-0:2.6.9-89.0.18.EL.s390x",
                  "product_id": "kernel-devel-0:2.6.9-89.0.18.EL.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.18.EL?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-89.0.18.EL.s390x",
                "product": {
                  "name": "kernel-0:2.6.9-89.0.18.EL.s390x",
                  "product_id": "kernel-0:2.6.9-89.0.18.EL.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.18.EL?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
                  "product_id": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.18.EL?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-89.0.18.EL.s390",
                "product": {
                  "name": "kernel-devel-0:2.6.9-89.0.18.EL.s390",
                  "product_id": "kernel-devel-0:2.6.9-89.0.18.EL.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.18.EL?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-89.0.18.EL.s390",
                "product": {
                  "name": "kernel-0:2.6.9-89.0.18.EL.s390",
                  "product_id": "kernel-0:2.6.9-89.0.18.EL.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.18.EL?arch=s390"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.s390 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-89.0.18.EL.s390"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.s390",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.s390x as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-89.0.18.EL.s390x"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.s390x",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.src as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-89.0.18.EL.src"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.src",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.s390 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.s390",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.s390x as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.s390x",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.9-89.0.18.EL.noarch as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-doc-0:2.6.9-89.0.18.EL.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.9-89.0.18.EL.noarch",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-smp-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-smp-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-xenU-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64iseries"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.s390",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390x"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.s390x",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.src as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-89.0.18.EL.src"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.src",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.s390",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.s390x",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.9-89.0.18.EL.noarch as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-doc-0:2.6.9-89.0.18.EL.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.9-89.0.18.EL.noarch",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-hugemem-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-smp-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-xenU-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64iseries"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.s390 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-89.0.18.EL.s390"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.s390",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.s390x as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-89.0.18.EL.s390x"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.s390x",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.src as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-89.0.18.EL.src"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.src",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.s390 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.s390",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.s390x as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.s390x",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.9-89.0.18.EL.noarch as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-doc-0:2.6.9-89.0.18.EL.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.9-89.0.18.EL.noarch",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-hugemem-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-smp-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-smp-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-smp-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-xenU-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.s390 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-89.0.18.EL.s390"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.s390",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.s390x as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-89.0.18.EL.s390x"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.s390x",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.src as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-89.0.18.EL.src"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.src",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.s390 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.s390",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.s390x as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.s390x",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.9-89.0.18.EL.noarch as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-doc-0:2.6.9-89.0.18.EL.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.9-89.0.18.EL.noarch",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-smp-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-smp-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-xenU-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
        "relates_to_product_reference": "4WS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2009-2910",
      "discovery_date": "2009-10-01T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "526788"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "arch/x86/ia32/ia32entry.S in the Linux kernel before 2.6.31.4 on the x86_64 platform does not clear certain kernel registers before a return to user mode, which allows local users to read register values from an earlier process by switching an ia32 process to 64-bit mode.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: x86_64 32 bit process register leak",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is not planned to be fixed in Red Hat Enterprise Linux 3, due to this product being in Production 3 of its maintenance life-cycle, where only qualified security errata of important and critical impact are addressed.\n\nFor further information about Errata Support Policy, visit: https://access.redhat.com/support/policy/updates/errata/",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:kernel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4AS:kernel-0:2.6.9-89.0.18.EL.s390",
          "4AS:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4AS:kernel-0:2.6.9-89.0.18.EL.src",
          "4AS:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4AS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.src",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4Desktop:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4ES:kernel-0:2.6.9-89.0.18.EL.s390",
          "4ES:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4ES:kernel-0:2.6.9-89.0.18.EL.src",
          "4ES:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4ES:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4WS:kernel-0:2.6.9-89.0.18.EL.s390",
          "4WS:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4WS:kernel-0:2.6.9-89.0.18.EL.src",
          "4WS:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4WS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-2910"
        },
        {
          "category": "external",
          "summary": "RHBZ#526788",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=526788"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2910",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-2910"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2910",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2910"
        }
      ],
      "release_date": "2009-10-01T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-12-15T17:12:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-0:2.6.9-89.0.18.EL.src",
            "4AS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.src",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-0:2.6.9-89.0.18.EL.src",
            "4ES:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-0:2.6.9-89.0.18.EL.src",
            "4WS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1671"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "products": [
            "4AS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-0:2.6.9-89.0.18.EL.src",
            "4AS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.src",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-0:2.6.9-89.0.18.EL.src",
            "4ES:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-0:2.6.9-89.0.18.EL.src",
            "4WS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: x86_64 32 bit process register leak"
    },
    {
      "cve": "CVE-2009-3613",
      "discovery_date": "2009-10-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "529137"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The swiotlb functionality in the r8169 driver in drivers/net/r8169.c in the Linux kernel before 2.6.27.22 allows remote attackers to cause a denial of service (IOMMU space exhaustion and system crash) by using jumbo frames for a large amount of network traffic, as demonstrated by a flood ping.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: flood ping cause out-of-iommu error and panic when mtu larger than 1500",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:kernel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4AS:kernel-0:2.6.9-89.0.18.EL.s390",
          "4AS:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4AS:kernel-0:2.6.9-89.0.18.EL.src",
          "4AS:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4AS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.src",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4Desktop:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4ES:kernel-0:2.6.9-89.0.18.EL.s390",
          "4ES:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4ES:kernel-0:2.6.9-89.0.18.EL.src",
          "4ES:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4ES:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4WS:kernel-0:2.6.9-89.0.18.EL.s390",
          "4WS:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4WS:kernel-0:2.6.9-89.0.18.EL.src",
          "4WS:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4WS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3613"
        },
        {
          "category": "external",
          "summary": "RHBZ#529137",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529137"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3613",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3613"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3613",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3613"
        }
      ],
      "release_date": "2007-11-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-12-15T17:12:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-0:2.6.9-89.0.18.EL.src",
            "4AS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.src",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-0:2.6.9-89.0.18.EL.src",
            "4ES:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-0:2.6.9-89.0.18.EL.src",
            "4WS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1671"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "4AS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-0:2.6.9-89.0.18.EL.src",
            "4AS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.src",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-0:2.6.9-89.0.18.EL.src",
            "4ES:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-0:2.6.9-89.0.18.EL.src",
            "4WS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: flood ping cause out-of-iommu error and panic when mtu larger than 1500"
    },
    {
      "cve": "CVE-2009-3620",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2009-10-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "529597"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The ATI Rage 128 (aka r128) driver in the Linux kernel before 2.6.31-git11 does not properly verify Concurrent Command Engine (CCE) state initialization, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly gain privileges via unspecified ioctl calls.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: r128 IOCTL NULL pointer dereferences when CCE state is uninitialised",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:kernel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4AS:kernel-0:2.6.9-89.0.18.EL.s390",
          "4AS:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4AS:kernel-0:2.6.9-89.0.18.EL.src",
          "4AS:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4AS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.src",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4Desktop:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4ES:kernel-0:2.6.9-89.0.18.EL.s390",
          "4ES:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4ES:kernel-0:2.6.9-89.0.18.EL.src",
          "4ES:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4ES:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4WS:kernel-0:2.6.9-89.0.18.EL.s390",
          "4WS:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4WS:kernel-0:2.6.9-89.0.18.EL.src",
          "4WS:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4WS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3620"
        },
        {
          "category": "external",
          "summary": "RHBZ#529597",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529597"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3620",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3620"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3620",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3620"
        }
      ],
      "release_date": "2009-08-30T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-12-15T17:12:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-0:2.6.9-89.0.18.EL.src",
            "4AS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.src",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-0:2.6.9-89.0.18.EL.src",
            "4ES:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-0:2.6.9-89.0.18.EL.src",
            "4WS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1671"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.9,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "4AS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-0:2.6.9-89.0.18.EL.src",
            "4AS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.src",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-0:2.6.9-89.0.18.EL.src",
            "4ES:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-0:2.6.9-89.0.18.EL.src",
            "4WS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: r128 IOCTL NULL pointer dereferences when CCE state is uninitialised"
    },
    {
      "cve": "CVE-2009-3621",
      "discovery_date": "2009-10-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "529626"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "net/unix/af_unix.c in the Linux kernel 2.6.31.4 and earlier allows local users to cause a denial of service (system hang) by creating an abstract-namespace AF_UNIX listening socket, performing a shutdown operation on this socket, and then performing a series of connect operations to this socket.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: AF_UNIX: Fix deadlock on connecting to shutdown socket",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is not planned to be fixed in Red Hat Enterprise Linux 3, due to this product being in Production 3 of its maintenance life-cycle, where only qualified security errata of important or critical impact are addressed.\n\nFor further information about Errata Support Policy, visit: https://access.redhat.com/support/policy/updates/errata/",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:kernel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4AS:kernel-0:2.6.9-89.0.18.EL.s390",
          "4AS:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4AS:kernel-0:2.6.9-89.0.18.EL.src",
          "4AS:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4AS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4AS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.src",
          "4Desktop:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4Desktop:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4ES:kernel-0:2.6.9-89.0.18.EL.s390",
          "4ES:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4ES:kernel-0:2.6.9-89.0.18.EL.src",
          "4ES:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4ES:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4ES:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4WS:kernel-0:2.6.9-89.0.18.EL.s390",
          "4WS:kernel-0:2.6.9-89.0.18.EL.s390x",
          "4WS:kernel-0:2.6.9-89.0.18.EL.src",
          "4WS:kernel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
          "4WS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
          "4WS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
          "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
          "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3621"
        },
        {
          "category": "external",
          "summary": "RHBZ#529626",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529626"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3621",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3621"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3621",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3621"
        }
      ],
      "release_date": "2009-10-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-12-15T17:12:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-0:2.6.9-89.0.18.EL.src",
            "4AS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.src",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-0:2.6.9-89.0.18.EL.src",
            "4ES:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-0:2.6.9-89.0.18.EL.src",
            "4WS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1671"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.9,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "4AS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-0:2.6.9-89.0.18.EL.src",
            "4AS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.src",
            "4Desktop:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-0:2.6.9-89.0.18.EL.src",
            "4ES:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-0:2.6.9-89.0.18.EL.src",
            "4WS:kernel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-89.0.18.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-89.0.18.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.18.EL.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: AF_UNIX: Fix deadlock on connecting to shutdown socket"
    }
  ]
}
  RHSA-2009:1670
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated kernel packages that fix multiple security issues and several bugs\nare now available for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nSecurity fixes:\n\n* NULL pointer dereference flaws in the r128 driver. Checks to test if the\nConcurrent Command Engine state was initialized were missing in private\nIOCTL functions. An attacker could use these flaws to cause a local denial\nof service or escalate their privileges. (CVE-2009-3620, Important)\n\n* a NULL pointer dereference flaw in the NFSv4 implementation. Several\nNFSv4 file locking functions failed to check whether a file had been opened\non the server before performing locking operations on it. A local user on a\nsystem with an NFSv4 share mounted could possibly use this flaw to cause a\ndenial of service or escalate their privileges. (CVE-2009-3726, Important)\n\n* a flaw in tcf_fill_node(). A certain data structure in this function was\nnot initialized properly before being copied to user-space. This could lead\nto an information leak. (CVE-2009-3612, Moderate)\n\n* unix_stream_connect() did not check if a UNIX domain socket was in the\nshutdown state. This could lead to a deadlock. A local, unprivileged user\ncould use this flaw to cause a denial of service. (CVE-2009-3621, Moderate)\n\nKnowledgebase DOC-20536 has steps to mitigate NULL pointer dereference\nflaws.\n\nBug fixes:\n\n* frequently changing a CPU between online and offline caused a kernel\npanic on some systems. (BZ#545583)\n\n* for the LSI Logic LSI53C1030 Ultra320 SCSI controller, read commands sent\ncould receive incorrect data, preventing correct data transfer. (BZ#529308)\n\n* pciehp could not detect PCI Express hot plug slots on some systems.\n(BZ#530383)\n\n* soft lockups: inotify race and contention on dcache_lock. (BZ#533822,\nBZ#537019)\n\n* priority ordered lists are now used for threads waiting for a given\nmutex. (BZ#533858)\n\n* a deadlock in DLM could cause GFS2 file systems to lock up. (BZ#533859)\n\n* use-after-free bug in the audit subsystem crashed certain systems when\nrunning usermod. (BZ#533861)\n\n* on certain hardware configurations, a kernel panic when the Broadcom\niSCSI offload driver (bnx2i.ko and cnic.ko) was loaded. (BZ#537014)\n\n* qla2xxx: Enabled MSI-X, and correctly handle the module parameter to\ncontrol it. This improves performance for certain systems. (BZ#537020)\n\n* system crash when reading the cpuaffinity file on a system. (BZ#537346)\n\n* suspend-resume problems on systems with lots of logical CPUs, e.g. BX-EX.\n(BZ#539674)\n\n* off-by-one error in the legacy PCI bus check. (BZ#539675)\n\n* TSC was not made available on systems with multi-clustered APICs. This\ncould cause slow performance for time-sensitive applications. (BZ#539676)\n\n* ACPI: ARB_DISABLE now disabled on platforms that do not need it.\n(BZ#539677)\n\n* fix node to core and power-aware scheduling issues, and a kernel panic\nduring boot on certain AMD Opteron processors. (BZ#539678, BZ#540469,\nBZ#539680, BZ#539682)\n\n* APIC timer interrupt issues on some AMD Opteron systems prevented\nachieving full power savings. (BZ#539681)\n\n* general OProfile support for some newer Intel processors. (BZ#539683)\n\n* system crash during boot when NUMA is enabled on systems using MC and\nkernel-xen. (BZ#539684)\n\n* on some larger systems, performance issues due to a spinlock. (BZ#539685)\n\n* APIC errors when IOMMU is enabled on some AMD Opteron systems.\n(BZ#539687)\n\n* on some AMD Opteron systems, repeatedly taking a CPU offline then online\ncaused a system hang. (BZ#539688)\n\n* I/O page fault errors on some systems. (BZ#539689)\n\n* certain memory configurations could cause the kernel-xen kernel to fail\nto boot on some AMD Opteron systems. (BZ#539690)\n\n* NMI watchdog is now disabled for offline CPUs. (BZ#539691)\n\n* duplicate directories in /proc/acpi/processor/ on BX-EX systems.\n(BZ#539692)\n\n* links did not come up when using bnx2x with certain Broadcom devices.\n(BZ#540381)\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2009:1670",
        "url": "https://access.redhat.com/errata/RHSA-2009:1670"
      },
      {
        "category": "external",
        "summary": "539684",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539684"
      },
      {
        "category": "external",
        "summary": "539685",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539685"
      },
      {
        "category": "external",
        "summary": "539687",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539687"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "http://kbase.redhat.com/faq/docs/DOC-20536",
        "url": "http://kbase.redhat.com/faq/docs/DOC-20536"
      },
      {
        "category": "external",
        "summary": "528868",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=528868"
      },
      {
        "category": "external",
        "summary": "529227",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529227"
      },
      {
        "category": "external",
        "summary": "529308",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529308"
      },
      {
        "category": "external",
        "summary": "529597",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529597"
      },
      {
        "category": "external",
        "summary": "529626",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529626"
      },
      {
        "category": "external",
        "summary": "530383",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=530383"
      },
      {
        "category": "external",
        "summary": "533822",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533822"
      },
      {
        "category": "external",
        "summary": "533858",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533858"
      },
      {
        "category": "external",
        "summary": "533861",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533861"
      },
      {
        "category": "external",
        "summary": "537014",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=537014"
      },
      {
        "category": "external",
        "summary": "537019",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=537019"
      },
      {
        "category": "external",
        "summary": "537020",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=537020"
      },
      {
        "category": "external",
        "summary": "537346",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=537346"
      },
      {
        "category": "external",
        "summary": "539675",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539675"
      },
      {
        "category": "external",
        "summary": "539676",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539676"
      },
      {
        "category": "external",
        "summary": "539677",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539677"
      },
      {
        "category": "external",
        "summary": "539678",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539678"
      },
      {
        "category": "external",
        "summary": "539680",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539680"
      },
      {
        "category": "external",
        "summary": "539681",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539681"
      },
      {
        "category": "external",
        "summary": "539682",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539682"
      },
      {
        "category": "external",
        "summary": "539683",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539683"
      },
      {
        "category": "external",
        "summary": "539688",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539688"
      },
      {
        "category": "external",
        "summary": "539689",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539689"
      },
      {
        "category": "external",
        "summary": "539690",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539690"
      },
      {
        "category": "external",
        "summary": "539691",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539691"
      },
      {
        "category": "external",
        "summary": "540381",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=540381"
      },
      {
        "category": "external",
        "summary": "540469",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=540469"
      },
      {
        "category": "external",
        "summary": "533859",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533859"
      },
      {
        "category": "external",
        "summary": "545583",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=545583"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1670.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security and bug fix update",
    "tracking": {
      "current_release_date": "2025-10-09T13:25:53+00:00",
      "generator": {
        "date": "2025-10-09T13:25:53+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2009:1670",
      "initial_release_date": "2009-12-15T17:05:00+00:00",
      "revision_history": [
        {
          "date": "2009-12-15T17:05:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2009-12-15T12:18:47+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T13:25:53+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
                "product": {
                  "name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
                  "product_id": "5Client",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:5::client"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux (v. 5 server)",
                "product": {
                  "name": "Red Hat Enterprise Linux (v. 5 server)",
                  "product_id": "5Server",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:5::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
                "product": {
                  "name": "kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
                  "product_id": "kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-164.9.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-0:2.6.18-164.9.1.el5.i686",
                "product": {
                  "name": "kernel-xen-0:2.6.18-164.9.1.el5.i686",
                  "product_id": "kernel-xen-0:2.6.18-164.9.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-164.9.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-164.9.1.el5.i686",
                "product": {
                  "name": "kernel-devel-0:2.6.18-164.9.1.el5.i686",
                  "product_id": "kernel-devel-0:2.6.18-164.9.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-164.9.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-164.9.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-PAE-0:2.6.18-164.9.1.el5.i686",
                "product": {
                  "name": "kernel-PAE-0:2.6.18-164.9.1.el5.i686",
                  "product_id": "kernel-PAE-0:2.6.18-164.9.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-164.9.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
                "product": {
                  "name": "kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
                  "product_id": "kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-164.9.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
                "product": {
                  "name": "kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
                  "product_id": "kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-164.9.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
                  "product_id": "kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-164.9.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
                "product": {
                  "name": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
                  "product_id": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-164.9.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-164.9.1.el5.i686",
                "product": {
                  "name": "kernel-0:2.6.18-164.9.1.el5.i686",
                  "product_id": "kernel-0:2.6.18-164.9.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-164.9.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-164.9.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
                  "product_id": "kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-164.9.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-164.9.1.el5.i686",
                "product": {
                  "name": "kernel-debug-0:2.6.18-164.9.1.el5.i686",
                  "product_id": "kernel-debug-0:2.6.18-164.9.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-164.9.1.el5?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-164.9.1.el5.i386",
                "product": {
                  "name": "kernel-headers-0:2.6.18-164.9.1.el5.i386",
                  "product_id": "kernel-headers-0:2.6.18-164.9.1.el5.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-164.9.1.el5?arch=i386"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i386"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
                "product": {
                  "name": "kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
                  "product_id": "kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-164.9.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
                "product": {
                  "name": "kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
                  "product_id": "kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-164.9.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-164.9.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
                "product": {
                  "name": "kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
                  "product_id": "kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-164.9.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64",
                "product": {
                  "name": "kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64",
                  "product_id": "kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-164.9.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
                  "product_id": "kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-164.9.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
                "product": {
                  "name": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
                  "product_id": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-164.9.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-164.9.1.el5.x86_64",
                "product": {
                  "name": "kernel-0:2.6.18-164.9.1.el5.x86_64",
                  "product_id": "kernel-0:2.6.18-164.9.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-164.9.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-164.9.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
                  "product_id": "kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-164.9.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
                "product": {
                  "name": "kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
                  "product_id": "kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-164.9.1.el5?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-doc-0:2.6.18-164.9.1.el5.noarch",
                "product": {
                  "name": "kernel-doc-0:2.6.18-164.9.1.el5.noarch",
                  "product_id": "kernel-doc-0:2.6.18-164.9.1.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@2.6.18-164.9.1.el5?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-164.9.1.el5.src",
                "product": {
                  "name": "kernel-0:2.6.18-164.9.1.el5.src",
                  "product_id": "kernel-0:2.6.18-164.9.1.el5.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-164.9.1.el5?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-xen-0:2.6.18-164.9.1.el5.ia64",
                "product": {
                  "name": "kernel-xen-0:2.6.18-164.9.1.el5.ia64",
                  "product_id": "kernel-xen-0:2.6.18-164.9.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-164.9.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-164.9.1.el5.ia64",
                "product": {
                  "name": "kernel-devel-0:2.6.18-164.9.1.el5.ia64",
                  "product_id": "kernel-devel-0:2.6.18-164.9.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-164.9.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-164.9.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-164.9.1.el5.ia64",
                "product": {
                  "name": "kernel-headers-0:2.6.18-164.9.1.el5.ia64",
                  "product_id": "kernel-headers-0:2.6.18-164.9.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-164.9.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
                "product": {
                  "name": "kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
                  "product_id": "kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-164.9.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
                  "product_id": "kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-164.9.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
                "product": {
                  "name": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
                  "product_id": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-164.9.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-164.9.1.el5.ia64",
                "product": {
                  "name": "kernel-0:2.6.18-164.9.1.el5.ia64",
                  "product_id": "kernel-0:2.6.18-164.9.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-164.9.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-164.9.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
                  "product_id": "kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-164.9.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-164.9.1.el5.ia64",
                "product": {
                  "name": "kernel-debug-0:2.6.18-164.9.1.el5.ia64",
                  "product_id": "kernel-debug-0:2.6.18-164.9.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-164.9.1.el5?arch=ia64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ia64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
                "product": {
                  "name": "kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
                  "product_id": "kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-164.9.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-164.9.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
                "product": {
                  "name": "kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
                  "product_id": "kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-164.9.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
                "product": {
                  "name": "kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
                  "product_id": "kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-164.9.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
                  "product_id": "kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-164.9.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
                "product": {
                  "name": "kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
                  "product_id": "kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-164.9.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-164.9.1.el5.ppc64",
                "product": {
                  "name": "kernel-0:2.6.18-164.9.1.el5.ppc64",
                  "product_id": "kernel-0:2.6.18-164.9.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-164.9.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-164.9.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
                "product": {
                  "name": "kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
                  "product_id": "kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-164.9.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
                  "product_id": "kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-164.9.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
                "product": {
                  "name": "kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
                  "product_id": "kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-164.9.1.el5?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-164.9.1.el5.ppc",
                "product": {
                  "name": "kernel-headers-0:2.6.18-164.9.1.el5.ppc",
                  "product_id": "kernel-headers-0:2.6.18-164.9.1.el5.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-164.9.1.el5?arch=ppc"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-164.9.1.el5.s390x",
                "product": {
                  "name": "kernel-devel-0:2.6.18-164.9.1.el5.s390x",
                  "product_id": "kernel-devel-0:2.6.18-164.9.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-164.9.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-164.9.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-164.9.1.el5.s390x",
                "product": {
                  "name": "kernel-headers-0:2.6.18-164.9.1.el5.s390x",
                  "product_id": "kernel-headers-0:2.6.18-164.9.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-164.9.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
                "product": {
                  "name": "kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
                  "product_id": "kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-164.9.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
                  "product_id": "kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-164.9.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
                "product": {
                  "name": "kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
                  "product_id": "kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-164.9.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-164.9.1.el5.s390x",
                "product": {
                  "name": "kernel-0:2.6.18-164.9.1.el5.s390x",
                  "product_id": "kernel-0:2.6.18-164.9.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-164.9.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-164.9.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
                "product": {
                  "name": "kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
                  "product_id": "kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-164.9.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
                  "product_id": "kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-164.9.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-164.9.1.el5.s390x",
                "product": {
                  "name": "kernel-debug-0:2.6.18-164.9.1.el5.s390x",
                  "product_id": "kernel-debug-0:2.6.18-164.9.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-164.9.1.el5?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-0:2.6.18-164.9.1.el5.i686"
        },
        "product_reference": "kernel-0:2.6.18-164.9.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-0:2.6.18-164.9.1.el5.ia64"
        },
        "product_reference": "kernel-0:2.6.18-164.9.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-0:2.6.18-164.9.1.el5.ppc64"
        },
        "product_reference": "kernel-0:2.6.18-164.9.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-0:2.6.18-164.9.1.el5.s390x"
        },
        "product_reference": "kernel-0:2.6.18-164.9.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-164.9.1.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-0:2.6.18-164.9.1.el5.src"
        },
        "product_reference": "kernel-0:2.6.18-164.9.1.el5.src",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-0:2.6.18-164.9.1.el5.x86_64"
        },
        "product_reference": "kernel-0:2.6.18-164.9.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-PAE-0:2.6.18-164.9.1.el5.i686"
        },
        "product_reference": "kernel-PAE-0:2.6.18-164.9.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686"
        },
        "product_reference": "kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686"
        },
        "product_reference": "kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-0:2.6.18-164.9.1.el5.i686"
        },
        "product_reference": "kernel-debug-0:2.6.18-164.9.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ia64"
        },
        "product_reference": "kernel-debug-0:2.6.18-164.9.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ppc64"
        },
        "product_reference": "kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-0:2.6.18-164.9.1.el5.s390x"
        },
        "product_reference": "kernel-debug-0:2.6.18-164.9.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-0:2.6.18-164.9.1.el5.x86_64"
        },
        "product_reference": "kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-devel-0:2.6.18-164.9.1.el5.i686"
        },
        "product_reference": "kernel-devel-0:2.6.18-164.9.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.18-164.9.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-devel-0:2.6.18-164.9.1.el5.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.18-164.9.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-devel-0:2.6.18-164.9.1.el5.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.18-164.9.1.el5.noarch as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-doc-0:2.6.18-164.9.1.el5.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.18-164.9.1.el5.noarch",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-164.9.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-headers-0:2.6.18-164.9.1.el5.i386"
        },
        "product_reference": "kernel-headers-0:2.6.18-164.9.1.el5.i386",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ia64"
        },
        "product_reference": "kernel-headers-0:2.6.18-164.9.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-164.9.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc"
        },
        "product_reference": "kernel-headers-0:2.6.18-164.9.1.el5.ppc",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc64"
        },
        "product_reference": "kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-headers-0:2.6.18-164.9.1.el5.s390x"
        },
        "product_reference": "kernel-headers-0:2.6.18-164.9.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-headers-0:2.6.18-164.9.1.el5.x86_64"
        },
        "product_reference": "kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64"
        },
        "product_reference": "kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.s390x"
        },
        "product_reference": "kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64"
        },
        "product_reference": "kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64"
        },
        "product_reference": "kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-0:2.6.18-164.9.1.el5.i686"
        },
        "product_reference": "kernel-xen-0:2.6.18-164.9.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-0:2.6.18-164.9.1.el5.ia64"
        },
        "product_reference": "kernel-xen-0:2.6.18-164.9.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-0:2.6.18-164.9.1.el5.x86_64"
        },
        "product_reference": "kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-0:2.6.18-164.9.1.el5.i686"
        },
        "product_reference": "kernel-0:2.6.18-164.9.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-0:2.6.18-164.9.1.el5.ia64"
        },
        "product_reference": "kernel-0:2.6.18-164.9.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-0:2.6.18-164.9.1.el5.ppc64"
        },
        "product_reference": "kernel-0:2.6.18-164.9.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-0:2.6.18-164.9.1.el5.s390x"
        },
        "product_reference": "kernel-0:2.6.18-164.9.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-164.9.1.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-0:2.6.18-164.9.1.el5.src"
        },
        "product_reference": "kernel-0:2.6.18-164.9.1.el5.src",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-0:2.6.18-164.9.1.el5.x86_64"
        },
        "product_reference": "kernel-0:2.6.18-164.9.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-PAE-0:2.6.18-164.9.1.el5.i686"
        },
        "product_reference": "kernel-PAE-0:2.6.18-164.9.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686"
        },
        "product_reference": "kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686"
        },
        "product_reference": "kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-0:2.6.18-164.9.1.el5.i686"
        },
        "product_reference": "kernel-debug-0:2.6.18-164.9.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ia64"
        },
        "product_reference": "kernel-debug-0:2.6.18-164.9.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ppc64"
        },
        "product_reference": "kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-0:2.6.18-164.9.1.el5.s390x"
        },
        "product_reference": "kernel-debug-0:2.6.18-164.9.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-0:2.6.18-164.9.1.el5.x86_64"
        },
        "product_reference": "kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-devel-0:2.6.18-164.9.1.el5.i686"
        },
        "product_reference": "kernel-devel-0:2.6.18-164.9.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.18-164.9.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-devel-0:2.6.18-164.9.1.el5.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.18-164.9.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-devel-0:2.6.18-164.9.1.el5.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.18-164.9.1.el5.noarch as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-doc-0:2.6.18-164.9.1.el5.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.18-164.9.1.el5.noarch",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-164.9.1.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-headers-0:2.6.18-164.9.1.el5.i386"
        },
        "product_reference": "kernel-headers-0:2.6.18-164.9.1.el5.i386",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ia64"
        },
        "product_reference": "kernel-headers-0:2.6.18-164.9.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-164.9.1.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc"
        },
        "product_reference": "kernel-headers-0:2.6.18-164.9.1.el5.ppc",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc64"
        },
        "product_reference": "kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-headers-0:2.6.18-164.9.1.el5.s390x"
        },
        "product_reference": "kernel-headers-0:2.6.18-164.9.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-headers-0:2.6.18-164.9.1.el5.x86_64"
        },
        "product_reference": "kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64"
        },
        "product_reference": "kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.s390x"
        },
        "product_reference": "kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64"
        },
        "product_reference": "kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64"
        },
        "product_reference": "kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-0:2.6.18-164.9.1.el5.i686"
        },
        "product_reference": "kernel-xen-0:2.6.18-164.9.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-0:2.6.18-164.9.1.el5.ia64"
        },
        "product_reference": "kernel-xen-0:2.6.18-164.9.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-0:2.6.18-164.9.1.el5.x86_64"
        },
        "product_reference": "kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-164.9.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2009-3612",
      "discovery_date": "2009-10-14T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "528868"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The tcf_fill_node function in net/sched/cls_api.c in the netlink subsystem in the Linux kernel 2.6.x before 2.6.32-rc5, and 2.4.37.6 and earlier, does not initialize a certain tcm__pad2 structure member, which might allow local users to obtain sensitive information from kernel memory via unspecified vectors.  NOTE: this issue exists because of an incomplete fix for CVE-2005-4881.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: tcf_fill_node() infoleak due to typo in 9ef1d4c7",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is not planned to be fixed in Red Hat Enterprise Linux 3 due to this product being in Production 3 of its maintenance life-cycle, where only qualified security errata of important or critical impact are addressed.\n\nFor further information about the Errata Support Policy, visit: https://access.redhat.com/support/policy/updates/errata/",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-0:2.6.18-164.9.1.el5.src",
          "5Client:kernel-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-164.9.1.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-164.9.1.el5.i386",
          "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-xen-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-0:2.6.18-164.9.1.el5.src",
          "5Server:kernel-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-164.9.1.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-164.9.1.el5.i386",
          "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-xen-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3612"
        },
        {
          "category": "external",
          "summary": "RHBZ#528868",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=528868"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3612",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3612"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3612",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3612"
        }
      ],
      "release_date": "2009-10-08T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-12-15T17:05:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.9.1.el5.src",
            "5Client:kernel-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.9.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.9.1.el5.src",
            "5Server:kernel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.9.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1670"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.9.1.el5.src",
            "5Client:kernel-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.9.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.9.1.el5.src",
            "5Server:kernel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.9.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: tcf_fill_node() infoleak due to typo in 9ef1d4c7"
    },
    {
      "cve": "CVE-2009-3620",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2009-10-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "529597"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The ATI Rage 128 (aka r128) driver in the Linux kernel before 2.6.31-git11 does not properly verify Concurrent Command Engine (CCE) state initialization, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly gain privileges via unspecified ioctl calls.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: r128 IOCTL NULL pointer dereferences when CCE state is uninitialised",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-0:2.6.18-164.9.1.el5.src",
          "5Client:kernel-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-164.9.1.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-164.9.1.el5.i386",
          "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-xen-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-0:2.6.18-164.9.1.el5.src",
          "5Server:kernel-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-164.9.1.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-164.9.1.el5.i386",
          "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-xen-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3620"
        },
        {
          "category": "external",
          "summary": "RHBZ#529597",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529597"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3620",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3620"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3620",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3620"
        }
      ],
      "release_date": "2009-08-30T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-12-15T17:05:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.9.1.el5.src",
            "5Client:kernel-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.9.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.9.1.el5.src",
            "5Server:kernel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.9.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1670"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.9,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.9.1.el5.src",
            "5Client:kernel-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.9.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.9.1.el5.src",
            "5Server:kernel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.9.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: r128 IOCTL NULL pointer dereferences when CCE state is uninitialised"
    },
    {
      "cve": "CVE-2009-3621",
      "discovery_date": "2009-10-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "529626"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "net/unix/af_unix.c in the Linux kernel 2.6.31.4 and earlier allows local users to cause a denial of service (system hang) by creating an abstract-namespace AF_UNIX listening socket, performing a shutdown operation on this socket, and then performing a series of connect operations to this socket.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: AF_UNIX: Fix deadlock on connecting to shutdown socket",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is not planned to be fixed in Red Hat Enterprise Linux 3, due to this product being in Production 3 of its maintenance life-cycle, where only qualified security errata of important or critical impact are addressed.\n\nFor further information about Errata Support Policy, visit: https://access.redhat.com/support/policy/updates/errata/",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-0:2.6.18-164.9.1.el5.src",
          "5Client:kernel-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-164.9.1.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-164.9.1.el5.i386",
          "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-xen-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-0:2.6.18-164.9.1.el5.src",
          "5Server:kernel-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-164.9.1.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-164.9.1.el5.i386",
          "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-xen-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3621"
        },
        {
          "category": "external",
          "summary": "RHBZ#529626",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529626"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3621",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3621"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3621",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3621"
        }
      ],
      "release_date": "2009-10-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-12-15T17:05:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.9.1.el5.src",
            "5Client:kernel-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.9.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.9.1.el5.src",
            "5Server:kernel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.9.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1670"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.9,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.9.1.el5.src",
            "5Client:kernel-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.9.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.9.1.el5.src",
            "5Server:kernel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.9.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: AF_UNIX: Fix deadlock on connecting to shutdown socket"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Simon Vallet"
          ]
        }
      ],
      "cve": "CVE-2009-3726",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2009-11-05T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "529227"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The nfs4_proc_lock function in fs/nfs/nfs4proc.c in the NFSv4 client in the Linux kernel before 2.6.31-rc4 allows remote NFS servers to cause a denial of service (NULL pointer dereference and panic) by sending a certain response containing incorrect file attributes, which trigger attempted use of an open file that lacks NFSv4 state.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: nfsv4: kernel panic in nfs4_proc_lock()",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The Linux kernel as shipped with Red Hat Enterprise Linux 3 did not have support for NFSv4, and therefore is not affected by this issue. It was addressed in Red Hat Enterprise Linux 4, 5, and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2010-0474.html, https://rhn.redhat.com/errata/RHSA-2009-1670.html and https://rhn.redhat.com/errata/RHSA-2009-1635.html respectively.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-0:2.6.18-164.9.1.el5.src",
          "5Client:kernel-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-164.9.1.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-164.9.1.el5.i386",
          "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-xen-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-0:2.6.18-164.9.1.el5.src",
          "5Server:kernel-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-164.9.1.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-164.9.1.el5.i386",
          "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-xen-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3726"
        },
        {
          "category": "external",
          "summary": "RHBZ#529227",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529227"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3726",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3726"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3726",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3726"
        }
      ],
      "release_date": "2008-10-22T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-12-15T17:05:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.9.1.el5.src",
            "5Client:kernel-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.9.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.9.1.el5.src",
            "5Server:kernel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.9.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1670"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-0:2.6.18-164.9.1.el5.src",
            "5Client:kernel-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-164.9.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-0:2.6.18-164.9.1.el5.src",
            "5Server:kernel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-164.9.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-164.9.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-164.9.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-164.9.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: nfsv4: kernel panic in nfs4_proc_lock()"
    }
  ]
}
  rhsa-2010_0882
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated kernel packages that fix several security issues and one bug are\nnow available for Red Hat Enterprise Linux 3 Extended Life Cycle Support\n(ELS).\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues:\n\n* An array index error was found in the gdth driver in the Linux kernel. A\nlocal user could send a specially-crafted IOCTL request that would cause a\ndenial of service or, possibly, privilege escalation. (CVE-2009-3080,\nImportant)\n\n* NULL pointer dereference flaws were found in the r128 driver in the Linux\nkernel. Checks to test if the Concurrent Command Engine state was\ninitialized were missing in private IOCTL functions. An attacker could use\nthese flaws to cause a local denial of service or escalate their\nprivileges. (CVE-2009-3620, Important)\n\n* A flaw was found in the Intel PRO/1000 Linux driver, e1000, in the Linux\nkernel. A remote attacker using packets larger than the MTU could bypass\nthe existing fragment check, resulting in partial, invalid frames being\npassed to the network stack. This flaw could also possibly be used to\ntrigger a remote denial of service. (CVE-2009-4536, Important)\n\n* A use-after-free flaw was found in the tcp_rcv_state_process() function\nin the Linux kernel TCP/IP protocol suite implementation. If a system using\nIPv6 had the IPV6_PKTINFO option set on a listening socket, a remote\nattacker could send an IPv6 packet to that system, causing a kernel panic\n(denial of service). (CVE-2010-1188, Important)\n\n* When an application has a stack overflow, the stack could silently\noverwrite another memory mapped area instead of a segmentation fault\noccurring, which could cause an application to execute arbitrary code,\npossibly leading to privilege escalation. It is known that the X Window\nSystem server can be used to trigger this flaw. (CVE-2010-2240, Important)\n\n* The compat_alloc_user_space() function in the Linux kernel 32/64-bit\ncompatibility layer implementation was missing sanity checks. This function\ncould be abused in other areas of the Linux kernel. On 64-bit systems, a\nlocal, unprivileged user could use this flaw to escalate their privileges.\n(CVE-2010-3081, Important)\n\nRed Hat would like to thank the X.Org security team for reporting the\nCVE-2010-2240 issue, with upstream acknowledging Rafal Wojtczuk as the\noriginal reporter; and Ben Hawkes for reporting the CVE-2010-3081 issue.\n\nThis update also fixes the following bug:\n\n* The RHSA-2009:1550 kernel update introduced a regression that prevented\ncertain custom kernel modules from loading, failing with \"unresolved\nsymbol\" errors. This update corrects this issue, allowing the affected\nmodules to load as expected. (BZ#556909)\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2010:0882",
        "url": "https://access.redhat.com/errata/RHSA-2010:0882"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/kb/docs/DOC-40265",
        "url": "https://access.redhat.com/kb/docs/DOC-40265"
      },
      {
        "category": "external",
        "summary": "http://www.redhat.com/rhel/server/extended_lifecycle_support/",
        "url": "http://www.redhat.com/rhel/server/extended_lifecycle_support/"
      },
      {
        "category": "external",
        "summary": "529597",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529597"
      },
      {
        "category": "external",
        "summary": "539414",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539414"
      },
      {
        "category": "external",
        "summary": "552126",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=552126"
      },
      {
        "category": "external",
        "summary": "556909",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=556909"
      },
      {
        "category": "external",
        "summary": "577711",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=577711"
      },
      {
        "category": "external",
        "summary": "606611",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=606611"
      },
      {
        "category": "external",
        "summary": "634457",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=634457"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0882.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security and bug fix update",
    "tracking": {
      "current_release_date": "2024-11-22T03:47:18+00:00",
      "generator": {
        "date": "2024-11-22T03:47:18+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2010:0882",
      "initial_release_date": "2010-11-12T09:36:00+00:00",
      "revision_history": [
        {
          "date": "2010-11-12T09:36:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2010-11-12T04:36:39+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-22T03:47:18+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AS (v. 3 ELS)",
                "product": {
                  "name": "Red Hat Enterprise Linux AS (v. 3 ELS)",
                  "product_id": "3AS-ELS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_els:3::as"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux ES (v. 3 ELS)",
                "product": {
                  "name": "Red Hat Enterprise Linux ES (v. 3 ELS)",
                  "product_id": "3ES-ELS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_els:3::es"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-BOOT-0:2.4.21-66.EL.i386",
                "product": {
                  "name": "kernel-BOOT-0:2.4.21-66.EL.i386",
                  "product_id": "kernel-BOOT-0:2.4.21-66.EL.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-BOOT@2.4.21-66.EL?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-doc-0:2.4.21-66.EL.i386",
                "product": {
                  "name": "kernel-doc-0:2.4.21-66.EL.i386",
                  "product_id": "kernel-doc-0:2.4.21-66.EL.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-66.EL?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.4.21-66.EL.i386",
                "product": {
                  "name": "kernel-debuginfo-0:2.4.21-66.EL.i386",
                  "product_id": "kernel-debuginfo-0:2.4.21-66.EL.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-66.EL?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-0:2.4.21-66.EL.i386",
                "product": {
                  "name": "kernel-source-0:2.4.21-66.EL.i386",
                  "product_id": "kernel-source-0:2.4.21-66.EL.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-source@2.4.21-66.EL?arch=i386"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i386"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-unsupported-0:2.4.21-66.EL.i686",
                "product": {
                  "name": "kernel-unsupported-0:2.4.21-66.EL.i686",
                  "product_id": "kernel-unsupported-0:2.4.21-66.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-66.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-hugemem-0:2.4.21-66.EL.i686",
                "product": {
                  "name": "kernel-hugemem-0:2.4.21-66.EL.i686",
                  "product_id": "kernel-hugemem-0:2.4.21-66.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-hugemem@2.4.21-66.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.4.21-66.EL.i686",
                "product": {
                  "name": "kernel-0:2.4.21-66.EL.i686",
                  "product_id": "kernel-0:2.4.21-66.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.4.21-66.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-smp-unsupported-0:2.4.21-66.EL.i686",
                "product": {
                  "name": "kernel-smp-unsupported-0:2.4.21-66.EL.i686",
                  "product_id": "kernel-smp-unsupported-0:2.4.21-66.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-smp-unsupported@2.4.21-66.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.4.21-66.EL.i686",
                "product": {
                  "name": "kernel-debuginfo-0:2.4.21-66.EL.i686",
                  "product_id": "kernel-debuginfo-0:2.4.21-66.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-66.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-smp-0:2.4.21-66.EL.i686",
                "product": {
                  "name": "kernel-smp-0:2.4.21-66.EL.i686",
                  "product_id": "kernel-smp-0:2.4.21-66.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-smp@2.4.21-66.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
                "product": {
                  "name": "kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
                  "product_id": "kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-hugemem-unsupported@2.4.21-66.EL?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-unsupported-0:2.4.21-66.EL.athlon",
                "product": {
                  "name": "kernel-unsupported-0:2.4.21-66.EL.athlon",
                  "product_id": "kernel-unsupported-0:2.4.21-66.EL.athlon",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-66.EL?arch=athlon"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.4.21-66.EL.athlon",
                "product": {
                  "name": "kernel-0:2.4.21-66.EL.athlon",
                  "product_id": "kernel-0:2.4.21-66.EL.athlon",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.4.21-66.EL?arch=athlon"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
                "product": {
                  "name": "kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
                  "product_id": "kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-smp-unsupported@2.4.21-66.EL?arch=athlon"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.4.21-66.EL.athlon",
                "product": {
                  "name": "kernel-debuginfo-0:2.4.21-66.EL.athlon",
                  "product_id": "kernel-debuginfo-0:2.4.21-66.EL.athlon",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-66.EL?arch=athlon"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-smp-0:2.4.21-66.EL.athlon",
                "product": {
                  "name": "kernel-smp-0:2.4.21-66.EL.athlon",
                  "product_id": "kernel-smp-0:2.4.21-66.EL.athlon",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-smp@2.4.21-66.EL?arch=athlon"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "athlon"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:2.4.21-66.EL.src",
                "product": {
                  "name": "kernel-0:2.4.21-66.EL.src",
                  "product_id": "kernel-0:2.4.21-66.EL.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.4.21-66.EL?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-66.EL.athlon as a component of Red Hat Enterprise Linux AS (v. 3 ELS)",
          "product_id": "3AS-ELS:kernel-0:2.4.21-66.EL.athlon"
        },
        "product_reference": "kernel-0:2.4.21-66.EL.athlon",
        "relates_to_product_reference": "3AS-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)",
          "product_id": "3AS-ELS:kernel-0:2.4.21-66.EL.i686"
        },
        "product_reference": "kernel-0:2.4.21-66.EL.i686",
        "relates_to_product_reference": "3AS-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-66.EL.src as a component of Red Hat Enterprise Linux AS (v. 3 ELS)",
          "product_id": "3AS-ELS:kernel-0:2.4.21-66.EL.src"
        },
        "product_reference": "kernel-0:2.4.21-66.EL.src",
        "relates_to_product_reference": "3AS-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-BOOT-0:2.4.21-66.EL.i386 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)",
          "product_id": "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386"
        },
        "product_reference": "kernel-BOOT-0:2.4.21-66.EL.i386",
        "relates_to_product_reference": "3AS-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-66.EL.athlon as a component of Red Hat Enterprise Linux AS (v. 3 ELS)",
          "product_id": "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-66.EL.athlon",
        "relates_to_product_reference": "3AS-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-66.EL.i386 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)",
          "product_id": "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-66.EL.i386",
        "relates_to_product_reference": "3AS-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)",
          "product_id": "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-66.EL.i686",
        "relates_to_product_reference": "3AS-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.4.21-66.EL.i386 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)",
          "product_id": "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386"
        },
        "product_reference": "kernel-doc-0:2.4.21-66.EL.i386",
        "relates_to_product_reference": "3AS-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)",
          "product_id": "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686"
        },
        "product_reference": "kernel-hugemem-0:2.4.21-66.EL.i686",
        "relates_to_product_reference": "3AS-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-unsupported-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)",
          "product_id": "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686"
        },
        "product_reference": "kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
        "relates_to_product_reference": "3AS-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.4.21-66.EL.athlon as a component of Red Hat Enterprise Linux AS (v. 3 ELS)",
          "product_id": "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon"
        },
        "product_reference": "kernel-smp-0:2.4.21-66.EL.athlon",
        "relates_to_product_reference": "3AS-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)",
          "product_id": "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686"
        },
        "product_reference": "kernel-smp-0:2.4.21-66.EL.i686",
        "relates_to_product_reference": "3AS-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-unsupported-0:2.4.21-66.EL.athlon as a component of Red Hat Enterprise Linux AS (v. 3 ELS)",
          "product_id": "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon"
        },
        "product_reference": "kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
        "relates_to_product_reference": "3AS-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-unsupported-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)",
          "product_id": "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686"
        },
        "product_reference": "kernel-smp-unsupported-0:2.4.21-66.EL.i686",
        "relates_to_product_reference": "3AS-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-0:2.4.21-66.EL.i386 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)",
          "product_id": "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386"
        },
        "product_reference": "kernel-source-0:2.4.21-66.EL.i386",
        "relates_to_product_reference": "3AS-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-66.EL.athlon as a component of Red Hat Enterprise Linux AS (v. 3 ELS)",
          "product_id": "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-66.EL.athlon",
        "relates_to_product_reference": "3AS-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)",
          "product_id": "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-66.EL.i686",
        "relates_to_product_reference": "3AS-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-66.EL.athlon as a component of Red Hat Enterprise Linux ES (v. 3 ELS)",
          "product_id": "3ES-ELS:kernel-0:2.4.21-66.EL.athlon"
        },
        "product_reference": "kernel-0:2.4.21-66.EL.athlon",
        "relates_to_product_reference": "3ES-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)",
          "product_id": "3ES-ELS:kernel-0:2.4.21-66.EL.i686"
        },
        "product_reference": "kernel-0:2.4.21-66.EL.i686",
        "relates_to_product_reference": "3ES-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-66.EL.src as a component of Red Hat Enterprise Linux ES (v. 3 ELS)",
          "product_id": "3ES-ELS:kernel-0:2.4.21-66.EL.src"
        },
        "product_reference": "kernel-0:2.4.21-66.EL.src",
        "relates_to_product_reference": "3ES-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-BOOT-0:2.4.21-66.EL.i386 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)",
          "product_id": "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386"
        },
        "product_reference": "kernel-BOOT-0:2.4.21-66.EL.i386",
        "relates_to_product_reference": "3ES-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-66.EL.athlon as a component of Red Hat Enterprise Linux ES (v. 3 ELS)",
          "product_id": "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-66.EL.athlon",
        "relates_to_product_reference": "3ES-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-66.EL.i386 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)",
          "product_id": "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-66.EL.i386",
        "relates_to_product_reference": "3ES-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)",
          "product_id": "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-66.EL.i686",
        "relates_to_product_reference": "3ES-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.4.21-66.EL.i386 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)",
          "product_id": "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386"
        },
        "product_reference": "kernel-doc-0:2.4.21-66.EL.i386",
        "relates_to_product_reference": "3ES-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)",
          "product_id": "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686"
        },
        "product_reference": "kernel-hugemem-0:2.4.21-66.EL.i686",
        "relates_to_product_reference": "3ES-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-unsupported-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)",
          "product_id": "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686"
        },
        "product_reference": "kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
        "relates_to_product_reference": "3ES-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.4.21-66.EL.athlon as a component of Red Hat Enterprise Linux ES (v. 3 ELS)",
          "product_id": "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon"
        },
        "product_reference": "kernel-smp-0:2.4.21-66.EL.athlon",
        "relates_to_product_reference": "3ES-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)",
          "product_id": "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686"
        },
        "product_reference": "kernel-smp-0:2.4.21-66.EL.i686",
        "relates_to_product_reference": "3ES-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-unsupported-0:2.4.21-66.EL.athlon as a component of Red Hat Enterprise Linux ES (v. 3 ELS)",
          "product_id": "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon"
        },
        "product_reference": "kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
        "relates_to_product_reference": "3ES-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-unsupported-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)",
          "product_id": "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686"
        },
        "product_reference": "kernel-smp-unsupported-0:2.4.21-66.EL.i686",
        "relates_to_product_reference": "3ES-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-0:2.4.21-66.EL.i386 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)",
          "product_id": "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386"
        },
        "product_reference": "kernel-source-0:2.4.21-66.EL.i386",
        "relates_to_product_reference": "3ES-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-66.EL.athlon as a component of Red Hat Enterprise Linux ES (v. 3 ELS)",
          "product_id": "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-66.EL.athlon",
        "relates_to_product_reference": "3ES-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)",
          "product_id": "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-66.EL.i686",
        "relates_to_product_reference": "3ES-ELS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2009-3080",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2009-11-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "539414"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Array index error in the gdth_read_event function in drivers/scsi/gdth.c in the Linux kernel before 2.6.32-rc8 allows local users to cause a denial of service or possibly gain privileges via a negative event index in an IOCTL request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: gdth: Prevent negative offsets in ioctl",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "3AS-ELS:kernel-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-0:2.4.21-66.EL.src",
          "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
          "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
          "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386",
          "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386",
          "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-0:2.4.21-66.EL.src",
          "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
          "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
          "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386",
          "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386",
          "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3080"
        },
        {
          "category": "external",
          "summary": "RHBZ#539414",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539414"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3080",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3080"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3080",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3080"
        }
      ],
      "release_date": "2009-11-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-11-12T09:36:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
          "product_ids": [
            "3AS-ELS:kernel-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-0:2.4.21-66.EL.src",
            "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-0:2.4.21-66.EL.src",
            "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0882"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "3AS-ELS:kernel-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-0:2.4.21-66.EL.src",
            "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-0:2.4.21-66.EL.src",
            "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: gdth: Prevent negative offsets in ioctl"
    },
    {
      "cve": "CVE-2009-3620",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2009-10-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "529597"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The ATI Rage 128 (aka r128) driver in the Linux kernel before 2.6.31-git11 does not properly verify Concurrent Command Engine (CCE) state initialization, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly gain privileges via unspecified ioctl calls.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: r128 IOCTL NULL pointer dereferences when CCE state is uninitialised",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "3AS-ELS:kernel-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-0:2.4.21-66.EL.src",
          "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
          "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
          "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386",
          "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386",
          "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-0:2.4.21-66.EL.src",
          "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
          "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
          "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386",
          "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386",
          "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3620"
        },
        {
          "category": "external",
          "summary": "RHBZ#529597",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529597"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3620",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3620"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3620",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3620"
        }
      ],
      "release_date": "2009-08-30T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-11-12T09:36:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
          "product_ids": [
            "3AS-ELS:kernel-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-0:2.4.21-66.EL.src",
            "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-0:2.4.21-66.EL.src",
            "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0882"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.9,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "3AS-ELS:kernel-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-0:2.4.21-66.EL.src",
            "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-0:2.4.21-66.EL.src",
            "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: r128 IOCTL NULL pointer dereferences when CCE state is uninitialised"
    },
    {
      "cve": "CVE-2009-4536",
      "discovery_date": "2009-12-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "552126"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel 2.6.32.3 and earlier handles Ethernet frames that exceed the MTU by processing certain trailing payload data as if it were a complete frame, which allows remote attackers to bypass packet filters via a large packet with a crafted payload.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1385.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: e1000 issue reported at 26c3",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "3AS-ELS:kernel-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-0:2.4.21-66.EL.src",
          "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
          "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
          "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386",
          "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386",
          "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-0:2.4.21-66.EL.src",
          "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
          "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
          "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386",
          "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386",
          "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-4536"
        },
        {
          "category": "external",
          "summary": "RHBZ#552126",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=552126"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-4536",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-4536"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4536",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4536"
        }
      ],
      "release_date": "2009-12-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-11-12T09:36:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
          "product_ids": [
            "3AS-ELS:kernel-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-0:2.4.21-66.EL.src",
            "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-0:2.4.21-66.EL.src",
            "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0882"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.8,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:A/AC:L/Au:N/C:N/I:P/A:C",
            "version": "2.0"
          },
          "products": [
            "3AS-ELS:kernel-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-0:2.4.21-66.EL.src",
            "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-0:2.4.21-66.EL.src",
            "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: e1000 issue reported at 26c3"
    },
    {
      "cve": "CVE-2010-1188",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2010-03-29T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "577711"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Use-after-free vulnerability in net/ipv4/tcp_input.c in the Linux kernel 2.6 before 2.6.20, when IPV6_RECVPKTINFO is set on a listening socket, allows remote attackers to cause a denial of service (kernel panic) via a SYN packet while the socket is in a listening (TCP_LISTEN) state, which is not properly handled and causes the skb structure to be freed.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: ipv6: skb is unexpectedly freed",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the version of the Linux kernel as shipped with Red Hat Enterprise MRG, as it was fixed since version v2.6.20-rc6.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "3AS-ELS:kernel-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-0:2.4.21-66.EL.src",
          "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
          "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
          "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386",
          "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386",
          "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-0:2.4.21-66.EL.src",
          "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
          "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
          "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386",
          "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386",
          "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2010-1188"
        },
        {
          "category": "external",
          "summary": "RHBZ#577711",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=577711"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2010-1188",
          "url": "https://www.cve.org/CVERecord?id=CVE-2010-1188"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-1188",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1188"
        }
      ],
      "release_date": "2007-01-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-11-12T09:36:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
          "product_ids": [
            "3AS-ELS:kernel-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-0:2.4.21-66.EL.src",
            "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-0:2.4.21-66.EL.src",
            "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0882"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.8,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "3AS-ELS:kernel-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-0:2.4.21-66.EL.src",
            "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-0:2.4.21-66.EL.src",
            "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: ipv6: skb is unexpectedly freed"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "X.Org security team"
          ]
        },
        {
          "names": [
            "Rafal Wojtczuk"
          ],
          "summary": "Acknowledged by upstream."
        }
      ],
      "cve": "CVE-2010-2240",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2010-06-21T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "606611"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The do_anonymous_page function in mm/memory.c in the Linux kernel before 2.6.27.52, 2.6.32.x before 2.6.32.19, 2.6.34.x before 2.6.34.4, and 2.6.35.x before 2.6.35.2 does not properly separate the stack and the heap, which allows context-dependent attackers to execute arbitrary code by writing to the bottom page of a shared memory segment, as demonstrated by a memory-exhaustion attack against the X.Org X server.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: mm: keep a guard page below a grow-down stack segment",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "3AS-ELS:kernel-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-0:2.4.21-66.EL.src",
          "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
          "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
          "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386",
          "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386",
          "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-0:2.4.21-66.EL.src",
          "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
          "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
          "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386",
          "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386",
          "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2010-2240"
        },
        {
          "category": "external",
          "summary": "RHBZ#606611",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=606611"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2010-2240",
          "url": "https://www.cve.org/CVERecord?id=CVE-2010-2240"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-2240",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2240"
        }
      ],
      "release_date": "2010-08-13T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-11-12T09:36:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
          "product_ids": [
            "3AS-ELS:kernel-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-0:2.4.21-66.EL.src",
            "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-0:2.4.21-66.EL.src",
            "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0882"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "3AS-ELS:kernel-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-0:2.4.21-66.EL.src",
            "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-0:2.4.21-66.EL.src",
            "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: mm: keep a guard page below a grow-down stack segment"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Ben Hawkes"
          ]
        }
      ],
      "cve": "CVE-2010-3081",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2010-09-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "634457"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The compat_alloc_user_space functions in include/asm/compat.h files in the Linux kernel before 2.6.36-rc4-git2 on 64-bit platforms do not properly allocate the userspace memory required for the 32-bit compatibility layer, which allows local users to gain privileges by leveraging the ability of the compat_mc_getsockopt function (aka the MCAST_MSFILTER getsockopt support) to control a certain length value, related to a \"stack pointer underflow\" issue, as exploited in the wild in September 2010.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: 64-bit Compatibility Mode Stack Pointer Underflow",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "More information can be found in this kbase: https://access.redhat.com/kb/docs/DOC-40265.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "3AS-ELS:kernel-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-0:2.4.21-66.EL.src",
          "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
          "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
          "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386",
          "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
          "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386",
          "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
          "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-0:2.4.21-66.EL.src",
          "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
          "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
          "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386",
          "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
          "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386",
          "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
          "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2010-3081"
        },
        {
          "category": "external",
          "summary": "RHBZ#634457",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=634457"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3081",
          "url": "https://www.cve.org/CVERecord?id=CVE-2010-3081"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3081",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3081"
        }
      ],
      "release_date": "2010-09-15T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-11-12T09:36:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
          "product_ids": [
            "3AS-ELS:kernel-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-0:2.4.21-66.EL.src",
            "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-0:2.4.21-66.EL.src",
            "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0882"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "3AS-ELS:kernel-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-0:2.4.21-66.EL.src",
            "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
            "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386",
            "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
            "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-0:2.4.21-66.EL.src",
            "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686",
            "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386",
            "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon",
            "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: 64-bit Compatibility Mode Stack Pointer Underflow"
    }
  ]
}
  fkie_cve-2009-3620
Vulnerability from fkie_nvd
| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | http://article.gmane.org/gmane.linux.kernel/892259 | Broken Link | |
| secalert@redhat.com | http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7dc482dfeeeefcfd000d4271c4626937406756d7 | Broken Link | |
| secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00002.html | Mailing List | |
| secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00005.html | Mailing List | |
| secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html | Mailing List | |
| secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00007.html | Mailing List | |
| secalert@redhat.com | http://lists.vmware.com/pipermail/security-announce/2010/000082.html | Broken Link | |
| secalert@redhat.com | http://secunia.com/advisories/36707 | Broken Link, Vendor Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/37909 | Broken Link | |
| secalert@redhat.com | http://secunia.com/advisories/38794 | Broken Link | |
| secalert@redhat.com | http://secunia.com/advisories/38834 | Broken Link | |
| secalert@redhat.com | http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.31-git11.log | Broken Link, Patch | |
| secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDVSA-2010:088 | Broken Link | |
| secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDVSA-2010:198 | Broken Link | |
| secalert@redhat.com | http://www.openwall.com/lists/oss-security/2009/10/19/1 | Mailing List, Patch | |
| secalert@redhat.com | http://www.openwall.com/lists/oss-security/2009/10/19/3 | Mailing List, Patch | |
| secalert@redhat.com | http://www.redhat.com/support/errata/RHSA-2009-1670.html | Broken Link | |
| secalert@redhat.com | http://www.redhat.com/support/errata/RHSA-2009-1671.html | Broken Link | |
| secalert@redhat.com | http://www.redhat.com/support/errata/RHSA-2010-0882.html | Broken Link | |
| secalert@redhat.com | http://www.securityfocus.com/bid/36824 | Broken Link, Third Party Advisory, VDB Entry | |
| secalert@redhat.com | http://www.ubuntu.com/usn/usn-864-1 | Third Party Advisory | |
| secalert@redhat.com | http://www.vupen.com/english/advisories/2010/0528 | Broken Link | |
| secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=529597 | Issue Tracking | |
| secalert@redhat.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6763 | Broken Link | |
| secalert@redhat.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9891 | Broken Link | |
| secalert@redhat.com | https://rhn.redhat.com/errata/RHSA-2009-1540.html | Third Party Advisory | |
| secalert@redhat.com | https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00190.html | Mailing List, Release Notes | |
| af854a3a-2127-422b-91ae-364da2661108 | http://article.gmane.org/gmane.linux.kernel/892259 | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7dc482dfeeeefcfd000d4271c4626937406756d7 | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00002.html | Mailing List | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00005.html | Mailing List | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html | Mailing List | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00007.html | Mailing List | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.vmware.com/pipermail/security-announce/2010/000082.html | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/36707 | Broken Link, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/37909 | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/38794 | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/38834 | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.31-git11.log | Broken Link, Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2010:088 | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2010:198 | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2009/10/19/1 | Mailing List, Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2009/10/19/3 | Mailing List, Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2009-1670.html | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2009-1671.html | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2010-0882.html | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/36824 | Broken Link, Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/usn-864-1 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/0528 | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=529597 | Issue Tracking | |
| af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6763 | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9891 | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | https://rhn.redhat.com/errata/RHSA-2009-1540.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00190.html | Mailing List, Release Notes | 
| Vendor | Product | Version | |
|---|---|---|---|
| linux | linux_kernel | * | |
| fedoraproject | fedora | 10 | |
| canonical | ubuntu_linux | 6.06 | |
| canonical | ubuntu_linux | 8.04 | |
| canonical | ubuntu_linux | 8.10 | |
| canonical | ubuntu_linux | 9.04 | |
| canonical | ubuntu_linux | 9.10 | |
| redhat | mrg_realtime | 1.0 | |
| suse | linux_enterprise_debuginfo | 10 | |
| suse | linux_enterprise_debuginfo | 10 | |
| opensuse | opensuse | 11.0 | |
| suse | linux_enterprise_desktop | 10 | |
| suse | linux_enterprise_desktop | 10 | |
| suse | linux_enterprise_server | 8 | |
| suse | linux_enterprise_server | 10 | |
| suse | linux_enterprise_server | 10 | 
{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C1AF884-1852-4B68-AAC8-91E97CCE1201",
              "versionEndExcluding": "2.6.31.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*",
              "matchCriteriaId": "7000D33B-F3C7-43E8-8FC7-9B97AADC3E12",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
              "matchCriteriaId": "454A5D17-B171-4F1F-9E0B-F18D1E5CA9FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*",
              "matchCriteriaId": "7EBFE35C-E243-43D1-883D-4398D71763CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "4747CC68-FAF4-482F-929A-9DA6C24CB663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5D026D0-EF78-438D-BEDD-FC8571F3ACEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2BCB73E-27BB-4878-AD9C-90C4F20C25A0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:redhat:mrg_realtime:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "04A20072-7DB7-4079-9456-E2CE98F888E7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:suse:linux_enterprise_debuginfo:10:sp2:*:*:*:*:*:*",
              "matchCriteriaId": "3E135846-8959-4D7E-A8E6-07F0EC15F010",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:suse:linux_enterprise_debuginfo:10:sp3:*:*:*:*:*:*",
              "matchCriteriaId": "6E0623AA-88D4-4E53-AD50-C9AF8E0B0247",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B42AB65-443B-4655-BAEA-4EB4A43D9509",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:10:sp2:*:*:*:*:*:*",
              "matchCriteriaId": "513797E6-FCE6-4E84-9B66-202541F9601E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*",
              "matchCriteriaId": "1E496249-23A8-42FC-A109-634A54B5600F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:suse:linux_enterprise_server:8:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA1E7EFF-1CCA-473B-8D5C-30D59C26DC70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:suse:linux_enterprise_server:10:sp2:*:*:-:*:*:*",
              "matchCriteriaId": "105187A7-2AFE-46F9-B0A9-F09C7E10BFBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*",
              "matchCriteriaId": "79A35457-EAA3-4BF9-A4DA-B2E414A75A02",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The ATI Rage 128 (aka r128) driver in the Linux kernel before 2.6.31-git11 does not properly verify Concurrent Command Engine (CCE) state initialization, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly gain privileges via unspecified ioctl calls."
    },
    {
      "lang": "es",
      "value": "El controlador ATI Rage 128 (tambi\u00e9n conocido como r128), en el Kernel de Linux anterior a v2.6.31-git11 no verifica de forma adecuada el estado de inicializaci\u00f3n del \"Concurrent Command Engine (CCE)\", lo que permite a usuarios locales provocar una denegaci\u00f3n de servicio (desreferenciaci\u00f3n de puntero nulo y ca\u00edda del sistema) o posiblemente obtener privilegios a trav\u00e9s de llamadas ioctl sin especificar."
    }
  ],
  "id": "CVE-2009-3620",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 4.9,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2009-10-22T16:00:00.577",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Broken Link"
      ],
      "url": "http://article.gmane.org/gmane.linux.kernel/892259"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Broken Link"
      ],
      "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7dc482dfeeeefcfd000d4271c4626937406756d7"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00002.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00005.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00007.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Broken Link"
      ],
      "url": "http://lists.vmware.com/pipermail/security-announce/2010/000082.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Broken Link",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/36707"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Broken Link"
      ],
      "url": "http://secunia.com/advisories/37909"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Broken Link"
      ],
      "url": "http://secunia.com/advisories/38794"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Broken Link"
      ],
      "url": "http://secunia.com/advisories/38834"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Broken Link",
        "Patch"
      ],
      "url": "http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.31-git11.log"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:088"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:198"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2009/10/19/1"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2009/10/19/3"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2009-1670.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2009-1671.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0882.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Broken Link",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/36824"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/usn-864-1"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/0528"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529597"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Broken Link"
      ],
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6763"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Broken Link"
      ],
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9891"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://rhn.redhat.com/errata/RHSA-2009-1540.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Release Notes"
      ],
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00190.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://article.gmane.org/gmane.linux.kernel/892259"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7dc482dfeeeefcfd000d4271c4626937406756d7"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00002.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00005.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00007.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://lists.vmware.com/pipermail/security-announce/2010/000082.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/36707"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://secunia.com/advisories/37909"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://secunia.com/advisories/38794"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://secunia.com/advisories/38834"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link",
        "Patch"
      ],
      "url": "http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.31-git11.log"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:088"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:198"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2009/10/19/1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2009/10/19/3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2009-1670.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2009-1671.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0882.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/36824"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/usn-864-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/0528"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529597"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6763"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9891"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://rhn.redhat.com/errata/RHSA-2009-1540.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Release Notes"
      ],
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00190.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-476"
        },
        {
          "lang": "en",
          "value": "CWE-908"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}
  CERTA-2010-AVI-106
Vulnerability from certfr_avis
Plusieurs vulnérabilités découvertes dans les produits VMware peuvent être exploitées à distance par un utilisateur malintentionné afin de compromettre le système ou d'entraver son bon fonctionnement.
Description
Les vulnérabilités présentes dans les produits VMware peuvent être exploitées afin de porter atteinte à l'intégrité et à la confidentialité des données, de réaliser un déni de service, d'injecter et d'exécuter indirectement du code arbitraire, d'élever ses privilèges ou d'exécuter du code arbitraire.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
                  
  | 
              |||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "VMware vMA 4.0 sans le patch 3.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "VMware ESX 3.0.3 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "VMware ESX 3.5 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "VMware ESX 2.5.5 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "VMware ESX 4.0 sans les patchs SX400-201002404-SG, SX400-201002406-SG, SX400-201002407-SG ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Description\n\nLes vuln\u00e9rabilit\u00e9s pr\u00e9sentes dans les produits VMware peuvent \u00eatre\nexploit\u00e9es afin de porter atteinte \u00e0 l\u0027int\u00e9grit\u00e9 et \u00e0 la confidentialit\u00e9\ndes donn\u00e9es, de r\u00e9aliser un d\u00e9ni de service, d\u0027injecter et d\u0027ex\u00e9cuter\nindirectement du code arbitraire, d\u0027\u00e9lever ses privil\u00e8ges ou d\u0027ex\u00e9cuter\ndu code arbitraire.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2009-2905",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2905"
    },
    {
      "name": "CVE-2009-1387",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1387"
    },
    {
      "name": "CVE-2009-3560",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-3560"
    },
    {
      "name": "CVE-2009-2849",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2849"
    },
    {
      "name": "CVE-2009-3916",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-3916"
    },
    {
      "name": "CVE-2009-0115",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-0115"
    },
    {
      "name": "CVE-2009-1379",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1379"
    },
    {
      "name": "CVE-2009-3613",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-3613"
    },
    {
      "name": "CVE-2009-4022",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-4022"
    },
    {
      "name": "CVE-2009-3563",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-3563"
    },
    {
      "name": "CVE-2009-3620",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-3620"
    },
    {
      "name": "CVE-2009-1189",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1189"
    },
    {
      "name": "CVE-2009-3228",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-3228"
    },
    {
      "name": "CVE-2009-3547",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-3547"
    },
    {
      "name": "CVE-2009-2695",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2695"
    },
    {
      "name": "CVE-2008-4316",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-4316"
    },
    {
      "name": "CVE-2009-1378",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1378"
    },
    {
      "name": "CVE-2008-3916",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-3916"
    },
    {
      "name": "CVE-2009-1386",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1386"
    },
    {
      "name": "CVE-2009-1377",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1377"
    },
    {
      "name": "CVE-2009-0590",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-0590"
    },
    {
      "name": "CVE-2009-3286",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-3286"
    },
    {
      "name": "CVE-2008-4552",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-4552"
    },
    {
      "name": "CVE-2009-3612",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-3612"
    },
    {
      "name": "CVE-2009-3621",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-3621"
    },
    {
      "name": "CVE-2009-3720",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-3720"
    },
    {
      "name": "CVE-2009-2904",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2904"
    },
    {
      "name": "CVE-2009-2908",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2908"
    },
    {
      "name": "CVE-2009-3726",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-3726"
    }
  ],
  "initial_release_date": "2010-03-04T00:00:00",
  "last_revision_date": "2010-03-04T00:00:00",
  "links": [],
  "reference": "CERTA-2010-AVI-106",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2010-03-04T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "Plusieurs vuln\u00e9rabilit\u00e9s d\u00e9couvertes dans les produits VMware peuvent\n\u00eatre exploit\u00e9es \u00e0 distance par un utilisateur malintentionn\u00e9 afin de\ncompromettre le syst\u00e8me ou d\u0027entraver son bon fonctionnement.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 VMware du 03 mars 2010",
      "url": "http://lists.vmware.com/pipermail/security-announce/2010/000082.html"
    }
  ]
}
  gsd-2009-3620
Vulnerability from gsd
{
  "GSD": {
    "alias": "CVE-2009-3620",
    "description": "The ATI Rage 128 (aka r128) driver in the Linux kernel before 2.6.31-git11 does not properly verify Concurrent Command Engine (CCE) state initialization, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly gain privileges via unspecified ioctl calls.",
    "id": "GSD-2009-3620",
    "references": [
      "https://www.suse.com/security/cve/CVE-2009-3620.html",
      "https://www.debian.org/security/2009/dsa-1928",
      "https://www.debian.org/security/2009/dsa-1927",
      "https://access.redhat.com/errata/RHSA-2010:0882",
      "https://access.redhat.com/errata/RHSA-2009:1671",
      "https://access.redhat.com/errata/RHSA-2009:1670",
      "https://access.redhat.com/errata/RHSA-2009:1540",
      "https://linux.oracle.com/cve/CVE-2009-3620.html"
    ]
  },
  "gsd": {
    "metadata": {
      "exploitCode": "unknown",
      "remediation": "unknown",
      "reportConfidence": "confirmed",
      "type": "vulnerability"
    },
    "osvSchema": {
      "aliases": [
        "CVE-2009-3620"
      ],
      "details": "The ATI Rage 128 (aka r128) driver in the Linux kernel before 2.6.31-git11 does not properly verify Concurrent Command Engine (CCE) state initialization, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly gain privileges via unspecified ioctl calls.",
      "id": "GSD-2009-3620",
      "modified": "2023-12-13T01:19:48.922732Z",
      "schema_version": "1.4.0"
    }
  },
  "namespaces": {
    "cve.org": {
      "CVE_data_meta": {
        "ASSIGNER": "secalert@redhat.com",
        "ID": "CVE-2009-3620",
        "STATE": "PUBLIC"
      },
      "affects": {
        "vendor": {
          "vendor_data": [
            {
              "product": {
                "product_data": [
                  {
                    "product_name": "n/a",
                    "version": {
                      "version_data": [
                        {
                          "version_affected": "=",
                          "version_value": "n/a"
                        }
                      ]
                    }
                  }
                ]
              },
              "vendor_name": "n/a"
            }
          ]
        }
      },
      "data_format": "MITRE",
      "data_type": "CVE",
      "data_version": "4.0",
      "description": {
        "description_data": [
          {
            "lang": "eng",
            "value": "The ATI Rage 128 (aka r128) driver in the Linux kernel before 2.6.31-git11 does not properly verify Concurrent Command Engine (CCE) state initialization, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly gain privileges via unspecified ioctl calls."
          }
        ]
      },
      "problemtype": {
        "problemtype_data": [
          {
            "description": [
              {
                "lang": "eng",
                "value": "n/a"
              }
            ]
          }
        ]
      },
      "references": {
        "reference_data": [
          {
            "name": "http://lists.vmware.com/pipermail/security-announce/2010/000082.html",
            "refsource": "MISC",
            "url": "http://lists.vmware.com/pipermail/security-announce/2010/000082.html"
          },
          {
            "name": "http://secunia.com/advisories/38794",
            "refsource": "MISC",
            "url": "http://secunia.com/advisories/38794"
          },
          {
            "name": "http://secunia.com/advisories/38834",
            "refsource": "MISC",
            "url": "http://secunia.com/advisories/38834"
          },
          {
            "name": "http://www.vupen.com/english/advisories/2010/0528",
            "refsource": "MISC",
            "url": "http://www.vupen.com/english/advisories/2010/0528"
          },
          {
            "name": "http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00002.html",
            "refsource": "MISC",
            "url": "http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00002.html"
          },
          {
            "name": "http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00005.html",
            "refsource": "MISC",
            "url": "http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00005.html"
          },
          {
            "name": "http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00007.html",
            "refsource": "MISC",
            "url": "http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00007.html"
          },
          {
            "name": "http://secunia.com/advisories/37909",
            "refsource": "MISC",
            "url": "http://secunia.com/advisories/37909"
          },
          {
            "name": "http://www.redhat.com/support/errata/RHSA-2010-0882.html",
            "refsource": "MISC",
            "url": "http://www.redhat.com/support/errata/RHSA-2010-0882.html"
          },
          {
            "name": "http://www.ubuntu.com/usn/usn-864-1",
            "refsource": "MISC",
            "url": "http://www.ubuntu.com/usn/usn-864-1"
          },
          {
            "name": "http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html",
            "refsource": "MISC",
            "url": "http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html"
          },
          {
            "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:198",
            "refsource": "MISC",
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:198"
          },
          {
            "name": "https://rhn.redhat.com/errata/RHSA-2009-1540.html",
            "refsource": "MISC",
            "url": "https://rhn.redhat.com/errata/RHSA-2009-1540.html"
          },
          {
            "name": "https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00190.html",
            "refsource": "MISC",
            "url": "https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00190.html"
          },
          {
            "name": "http://secunia.com/advisories/36707",
            "refsource": "MISC",
            "url": "http://secunia.com/advisories/36707"
          },
          {
            "name": "http://www.redhat.com/support/errata/RHSA-2009-1671.html",
            "refsource": "MISC",
            "url": "http://www.redhat.com/support/errata/RHSA-2009-1671.html"
          },
          {
            "name": "http://www.redhat.com/support/errata/RHSA-2009-1670.html",
            "refsource": "MISC",
            "url": "http://www.redhat.com/support/errata/RHSA-2009-1670.html"
          },
          {
            "name": "http://article.gmane.org/gmane.linux.kernel/892259",
            "refsource": "MISC",
            "url": "http://article.gmane.org/gmane.linux.kernel/892259"
          },
          {
            "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7dc482dfeeeefcfd000d4271c4626937406756d7",
            "refsource": "MISC",
            "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7dc482dfeeeefcfd000d4271c4626937406756d7"
          },
          {
            "name": "http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.31-git11.log",
            "refsource": "MISC",
            "url": "http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.31-git11.log"
          },
          {
            "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:088",
            "refsource": "MISC",
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:088"
          },
          {
            "name": "http://www.openwall.com/lists/oss-security/2009/10/19/1",
            "refsource": "MISC",
            "url": "http://www.openwall.com/lists/oss-security/2009/10/19/1"
          },
          {
            "name": "http://www.openwall.com/lists/oss-security/2009/10/19/3",
            "refsource": "MISC",
            "url": "http://www.openwall.com/lists/oss-security/2009/10/19/3"
          },
          {
            "name": "http://www.securityfocus.com/bid/36824",
            "refsource": "MISC",
            "url": "http://www.securityfocus.com/bid/36824"
          },
          {
            "name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6763",
            "refsource": "MISC",
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6763"
          },
          {
            "name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9891",
            "refsource": "MISC",
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9891"
          },
          {
            "name": "https://bugzilla.redhat.com/show_bug.cgi?id=529597",
            "refsource": "MISC",
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529597"
          }
        ]
      }
    },
    "nvd.nist.gov": {
      "cve": {
        "configurations": [
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "7C1AF884-1852-4B68-AAC8-91E97CCE1201",
                    "versionEndExcluding": "2.6.31.1",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ]
          },
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*",
                    "matchCriteriaId": "7000D33B-F3C7-43E8-8FC7-9B97AADC3E12",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ]
          },
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
                    "matchCriteriaId": "454A5D17-B171-4F1F-9E0B-F18D1E5CA9FD",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*",
                    "matchCriteriaId": "7EBFE35C-E243-43D1-883D-4398D71763CC",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*",
                    "matchCriteriaId": "4747CC68-FAF4-482F-929A-9DA6C24CB663",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*",
                    "matchCriteriaId": "A5D026D0-EF78-438D-BEDD-FC8571F3ACEB",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*",
                    "matchCriteriaId": "A2BCB73E-27BB-4878-AD9C-90C4F20C25A0",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ]
          },
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:a:redhat:mrg_realtime:1.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "04A20072-7DB7-4079-9456-E2CE98F888E7",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ]
          },
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:a:suse:linux_enterprise_debuginfo:10:sp2:*:*:*:*:*:*",
                    "matchCriteriaId": "3E135846-8959-4D7E-A8E6-07F0EC15F010",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:suse:linux_enterprise_debuginfo:10:sp3:*:*:*:*:*:*",
                    "matchCriteriaId": "6E0623AA-88D4-4E53-AD50-C9AF8E0B0247",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "1B42AB65-443B-4655-BAEA-4EB4A43D9509",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:10:sp2:*:*:*:*:*:*",
                    "matchCriteriaId": "513797E6-FCE6-4E84-9B66-202541F9601E",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*",
                    "matchCriteriaId": "1E496249-23A8-42FC-A109-634A54B5600F",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:suse:linux_enterprise_server:8:*:*:*:*:*:*:*",
                    "matchCriteriaId": "FA1E7EFF-1CCA-473B-8D5C-30D59C26DC70",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:suse:linux_enterprise_server:10:sp2:*:*:-:*:*:*",
                    "matchCriteriaId": "105187A7-2AFE-46F9-B0A9-F09C7E10BFBD",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*",
                    "matchCriteriaId": "79A35457-EAA3-4BF9-A4DA-B2E414A75A02",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ]
          }
        ],
        "descriptions": [
          {
            "lang": "en",
            "value": "The ATI Rage 128 (aka r128) driver in the Linux kernel before 2.6.31-git11 does not properly verify Concurrent Command Engine (CCE) state initialization, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly gain privileges via unspecified ioctl calls."
          },
          {
            "lang": "es",
            "value": "El controlador ATI Rage 128 (tambi\u00e9n conocido como r128), en el Kernel de Linux anterior a v2.6.31-git11 no verifica de forma adecuada el estado de inicializaci\u00f3n del \"Concurrent Command Engine (CCE)\", lo que permite a usuarios locales provocar una denegaci\u00f3n de servicio (desreferenciaci\u00f3n de puntero nulo y ca\u00edda del sistema) o posiblemente obtener privilegios a trav\u00e9s de llamadas ioctl sin especificar."
          }
        ],
        "id": "CVE-2009-3620",
        "lastModified": "2024-02-09T00:20:34.557",
        "metrics": {
          "cvssMetricV2": [
            {
              "acInsufInfo": false,
              "baseSeverity": "MEDIUM",
              "cvssData": {
                "accessComplexity": "LOW",
                "accessVector": "LOCAL",
                "authentication": "NONE",
                "availabilityImpact": "COMPLETE",
                "baseScore": 4.9,
                "confidentialityImpact": "NONE",
                "integrityImpact": "NONE",
                "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
                "version": "2.0"
              },
              "exploitabilityScore": 3.9,
              "impactScore": 6.9,
              "obtainAllPrivilege": false,
              "obtainOtherPrivilege": false,
              "obtainUserPrivilege": false,
              "source": "nvd@nist.gov",
              "type": "Primary",
              "userInteractionRequired": false
            }
          ],
          "cvssMetricV31": [
            {
              "cvssData": {
                "attackComplexity": "LOW",
                "attackVector": "LOCAL",
                "availabilityImpact": "HIGH",
                "baseScore": 7.8,
                "baseSeverity": "HIGH",
                "confidentialityImpact": "HIGH",
                "integrityImpact": "HIGH",
                "privilegesRequired": "LOW",
                "scope": "UNCHANGED",
                "userInteraction": "NONE",
                "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                "version": "3.1"
              },
              "exploitabilityScore": 1.8,
              "impactScore": 5.9,
              "source": "nvd@nist.gov",
              "type": "Primary"
            }
          ]
        },
        "published": "2009-10-22T16:00:00.577",
        "references": [
          {
            "source": "secalert@redhat.com",
            "tags": [
              "Broken Link"
            ],
            "url": "http://article.gmane.org/gmane.linux.kernel/892259"
          },
          {
            "source": "secalert@redhat.com",
            "tags": [
              "Broken Link"
            ],
            "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7dc482dfeeeefcfd000d4271c4626937406756d7"
          },
          {
            "source": "secalert@redhat.com",
            "tags": [
              "Mailing List"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00002.html"
          },
          {
            "source": "secalert@redhat.com",
            "tags": [
              "Mailing List"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00005.html"
          },
          {
            "source": "secalert@redhat.com",
            "tags": [
              "Mailing List"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html"
          },
          {
            "source": "secalert@redhat.com",
            "tags": [
              "Mailing List"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00007.html"
          },
          {
            "source": "secalert@redhat.com",
            "tags": [
              "Broken Link"
            ],
            "url": "http://lists.vmware.com/pipermail/security-announce/2010/000082.html"
          },
          {
            "source": "secalert@redhat.com",
            "tags": [
              "Broken Link",
              "Vendor Advisory"
            ],
            "url": "http://secunia.com/advisories/36707"
          },
          {
            "source": "secalert@redhat.com",
            "tags": [
              "Broken Link"
            ],
            "url": "http://secunia.com/advisories/37909"
          },
          {
            "source": "secalert@redhat.com",
            "tags": [
              "Broken Link"
            ],
            "url": "http://secunia.com/advisories/38794"
          },
          {
            "source": "secalert@redhat.com",
            "tags": [
              "Broken Link"
            ],
            "url": "http://secunia.com/advisories/38834"
          },
          {
            "source": "secalert@redhat.com",
            "tags": [
              "Broken Link",
              "Patch"
            ],
            "url": "http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.31-git11.log"
          },
          {
            "source": "secalert@redhat.com",
            "tags": [
              "Broken Link"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:088"
          },
          {
            "source": "secalert@redhat.com",
            "tags": [
              "Broken Link"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:198"
          },
          {
            "source": "secalert@redhat.com",
            "tags": [
              "Mailing List",
              "Patch"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2009/10/19/1"
          },
          {
            "source": "secalert@redhat.com",
            "tags": [
              "Mailing List",
              "Patch"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2009/10/19/3"
          },
          {
            "source": "secalert@redhat.com",
            "tags": [
              "Broken Link"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2009-1670.html"
          },
          {
            "source": "secalert@redhat.com",
            "tags": [
              "Broken Link"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2009-1671.html"
          },
          {
            "source": "secalert@redhat.com",
            "tags": [
              "Broken Link"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2010-0882.html"
          },
          {
            "source": "secalert@redhat.com",
            "tags": [
              "Broken Link",
              "Third Party Advisory",
              "VDB Entry"
            ],
            "url": "http://www.securityfocus.com/bid/36824"
          },
          {
            "source": "secalert@redhat.com",
            "tags": [
              "Third Party Advisory"
            ],
            "url": "http://www.ubuntu.com/usn/usn-864-1"
          },
          {
            "source": "secalert@redhat.com",
            "tags": [
              "Broken Link"
            ],
            "url": "http://www.vupen.com/english/advisories/2010/0528"
          },
          {
            "source": "secalert@redhat.com",
            "tags": [
              "Issue Tracking"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529597"
          },
          {
            "source": "secalert@redhat.com",
            "tags": [
              "Broken Link"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6763"
          },
          {
            "source": "secalert@redhat.com",
            "tags": [
              "Broken Link"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9891"
          },
          {
            "source": "secalert@redhat.com",
            "tags": [
              "Third Party Advisory"
            ],
            "url": "https://rhn.redhat.com/errata/RHSA-2009-1540.html"
          },
          {
            "source": "secalert@redhat.com",
            "tags": [
              "Mailing List",
              "Release Notes"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00190.html"
          }
        ],
        "sourceIdentifier": "secalert@redhat.com",
        "vulnStatus": "Analyzed",
        "weaknesses": [
          {
            "description": [
              {
                "lang": "en",
                "value": "CWE-476"
              },
              {
                "lang": "en",
                "value": "CWE-908"
              }
            ],
            "source": "nvd@nist.gov",
            "type": "Primary"
          }
        ]
      }
    }
  }
}
  ghsa-rgrv-jr8m-xv3m
Vulnerability from github
The ATI Rage 128 (aka r128) driver in the Linux kernel before 2.6.31-git11 does not properly verify Concurrent Command Engine (CCE) state initialization, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly gain privileges via unspecified ioctl calls.
{
  "affected": [],
  "aliases": [
    "CVE-2009-3620"
  ],
  "database_specific": {
    "cwe_ids": [
      "CWE-20",
      "CWE-476"
    ],
    "github_reviewed": false,
    "github_reviewed_at": null,
    "nvd_published_at": "2009-10-22T16:00:00Z",
    "severity": "MODERATE"
  },
  "details": "The ATI Rage 128 (aka r128) driver in the Linux kernel before 2.6.31-git11 does not properly verify Concurrent Command Engine (CCE) state initialization, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly gain privileges via unspecified ioctl calls.",
  "id": "GHSA-rgrv-jr8m-xv3m",
  "modified": "2023-11-03T18:30:20Z",
  "published": "2022-05-02T03:46:55Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3620"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/errata/RHSA-2009:1540"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/errata/RHSA-2009:1670"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/errata/RHSA-2009:1671"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/errata/RHSA-2010:0882"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/security/cve/CVE-2009-3620"
    },
    {
      "type": "WEB",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529597"
    },
    {
      "type": "WEB",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6763"
    },
    {
      "type": "WEB",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9891"
    },
    {
      "type": "WEB",
      "url": "https://rhn.redhat.com/errata/RHSA-2009-1540.html"
    },
    {
      "type": "WEB",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00190.html"
    },
    {
      "type": "WEB",
      "url": "http://article.gmane.org/gmane.linux.kernel/892259"
    },
    {
      "type": "WEB",
      "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7dc482dfeeeefcfd000d4271c4626937406756d7"
    },
    {
      "type": "WEB",
      "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=7dc482dfeeeefcfd000d4271c4626937406756d7"
    },
    {
      "type": "WEB",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00002.html"
    },
    {
      "type": "WEB",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00005.html"
    },
    {
      "type": "WEB",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html"
    },
    {
      "type": "WEB",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00007.html"
    },
    {
      "type": "WEB",
      "url": "http://lists.vmware.com/pipermail/security-announce/2010/000082.html"
    },
    {
      "type": "WEB",
      "url": "http://secunia.com/advisories/36707"
    },
    {
      "type": "WEB",
      "url": "http://secunia.com/advisories/37909"
    },
    {
      "type": "WEB",
      "url": "http://secunia.com/advisories/38794"
    },
    {
      "type": "WEB",
      "url": "http://secunia.com/advisories/38834"
    },
    {
      "type": "WEB",
      "url": "http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.31-git11.log"
    },
    {
      "type": "WEB",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:088"
    },
    {
      "type": "WEB",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:198"
    },
    {
      "type": "WEB",
      "url": "http://www.openwall.com/lists/oss-security/2009/10/19/1"
    },
    {
      "type": "WEB",
      "url": "http://www.openwall.com/lists/oss-security/2009/10/19/3"
    },
    {
      "type": "WEB",
      "url": "http://www.redhat.com/support/errata/RHSA-2009-1670.html"
    },
    {
      "type": "WEB",
      "url": "http://www.redhat.com/support/errata/RHSA-2009-1671.html"
    },
    {
      "type": "WEB",
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0882.html"
    },
    {
      "type": "WEB",
      "url": "http://www.securityfocus.com/bid/36824"
    },
    {
      "type": "WEB",
      "url": "http://www.ubuntu.com/usn/usn-864-1"
    },
    {
      "type": "WEB",
      "url": "http://www.vupen.com/english/advisories/2010/0528"
    }
  ],
  "schema_version": "1.4.0",
  "severity": [
    {
      "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "type": "CVSS_V3"
    }
  ]
}
  Sightings
| Author | Source | Type | Date | 
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
 - Confirmed: The vulnerability is confirmed from an analyst perspective.
 - Published Proof of Concept: A public proof of concept is available for this vulnerability.
 - Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
 - Patched: This vulnerability was successfully patched by the user reporting the sighting.
 - Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
 - Not confirmed: The user expresses doubt about the veracity of the vulnerability.
 - Not patched: This vulnerability was not successfully patched by the user reporting the sighting.