Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2010-3067 (GCVE-0-2010-3067)
Vulnerability from cvelistv5 – Published: 2010-09-21 17:00 – Updated: 2024-08-07 02:55- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T02:55:46.611Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "42778",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/42778"
},
{
"name": "USN-1000-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/USN-1000-1"
},
{
"name": "42801",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/42801"
},
{
"name": "20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded"
},
{
"name": "46397",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/46397"
},
{
"name": "SUSE-SA:2011:002",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.36-rc4-next-20100915.bz2"
},
{
"name": "SUSE-SA:2011:001",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html"
},
{
"name": "RHSA-2011:0007",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2011-0007.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=629441"
},
{
"name": "SUSE-SA:2011:007",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html"
},
{
"name": "SUSE-SA:2010:060",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html"
},
{
"name": "ADV-2011-0298",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2011/0298"
},
{
"name": "MDVSA-2011:051",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:051"
},
{
"name": "RHSA-2010:0839",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2010-0839.html"
},
{
"name": "MDVSA-2010:257",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:257"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html"
},
{
"name": "ADV-2011-0375",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2011/0375"
},
{
"name": "42890",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/42890"
},
{
"name": "ADV-2011-0012",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2011/0012"
},
{
"name": "kernel-doiosubmit-dos(61884)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61884"
},
{
"name": "SUSE-SA:2011:008",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html"
},
{
"name": "MDVSA-2011:029",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:029"
},
{
"name": "RHSA-2010:0758",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2010-0758.html"
},
{
"name": "43291",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/43291"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=75e1c70fc31490ef8a373ea2a4bea2524099b478"
},
{
"name": "RHSA-2010:0779",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2010-0779.html"
},
{
"name": "DSA-2126",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2010/dsa-2126"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2010-09-15T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Integer overflow in the do_io_submit function in fs/aio.c in the Linux kernel before 2.6.36-rc4-next-20100915 allows local users to cause a denial of service or possibly have unspecified other impact via crafted use of the io_submit system call."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-10T18:57:01.000Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "42778",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/42778"
},
{
"name": "USN-1000-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/USN-1000-1"
},
{
"name": "42801",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/42801"
},
{
"name": "20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded"
},
{
"name": "46397",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/46397"
},
{
"name": "SUSE-SA:2011:002",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.36-rc4-next-20100915.bz2"
},
{
"name": "SUSE-SA:2011:001",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html"
},
{
"name": "RHSA-2011:0007",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2011-0007.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=629441"
},
{
"name": "SUSE-SA:2011:007",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html"
},
{
"name": "SUSE-SA:2010:060",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html"
},
{
"name": "ADV-2011-0298",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2011/0298"
},
{
"name": "MDVSA-2011:051",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:051"
},
{
"name": "RHSA-2010:0839",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2010-0839.html"
},
{
"name": "MDVSA-2010:257",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:257"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html"
},
{
"name": "ADV-2011-0375",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2011/0375"
},
{
"name": "42890",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/42890"
},
{
"name": "ADV-2011-0012",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2011/0012"
},
{
"name": "kernel-doiosubmit-dos(61884)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61884"
},
{
"name": "SUSE-SA:2011:008",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html"
},
{
"name": "MDVSA-2011:029",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:029"
},
{
"name": "RHSA-2010:0758",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2010-0758.html"
},
{
"name": "43291",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/43291"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=75e1c70fc31490ef8a373ea2a4bea2524099b478"
},
{
"name": "RHSA-2010:0779",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2010-0779.html"
},
{
"name": "DSA-2126",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2010/dsa-2126"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2010-3067",
"datePublished": "2010-09-21T17:00:00.000Z",
"dateReserved": "2010-08-20T00:00:00.000Z",
"dateUpdated": "2024-08-07T02:55:46.611Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2010-3067",
"date": "2026-05-20",
"epss": "0.00151",
"percentile": "0.3531"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2.6.36\", \"matchCriteriaId\": \"C8DCE5E2-B055-4F05-8F0F-F19D1B7BA8D7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"D4407EF9-4ECF-408F-9ECB-0705E3FB65D5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"DBE26099-6D2C-4FAF-B15C-CBF985D59171\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"F2C193FF-3723-4BE9-8787-DED7D455FA8F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"F874FE6A-968D-47E1-900A-E154E41EDAF8\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A01C8B7E-EB19-40EA-B1D2-9AE5EA536C95\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5646FDE9-CF21-46A9-B89D-F5BBDB4249AF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*\", \"matchCriteriaId\": \"1E496249-23A8-42FC-A109-634A54B5600F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*\", \"matchCriteriaId\": \"640FB29C-1A84-41E1-86DE-B542EA0EF153\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4CD2D897-E321-4CED-92E0-11A98B52053C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*\", \"matchCriteriaId\": \"25CBACD3-AFB7-410D-927F-0C1FF477D396\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*\", \"matchCriteriaId\": \"3DB8A616-865B-4E70-BA2E-BE5F0BA7A351\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8C757774-08E7-40AA-B532-6F705C8F7639\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"454A5D17-B171-4F1F-9E0B-F18D1E5CA9FD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*\", \"matchCriteriaId\": \"7EBFE35C-E243-43D1-883D-4398D71763CC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A5D026D0-EF78-438D-BEDD-FC8571F3ACEB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A2BCB73E-27BB-4878-AD9C-90C4F20C25A0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*\", \"matchCriteriaId\": \"01EDA41C-6B2E-49AF-B503-EB3882265C11\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"87614B58-24AB-49FB-9C84-E8DDBA16353B\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Integer overflow in the do_io_submit function in fs/aio.c in the Linux kernel before 2.6.36-rc4-next-20100915 allows local users to cause a denial of service or possibly have unspecified other impact via crafted use of the io_submit system call.\"}, {\"lang\": \"es\", \"value\": \"Vulnerabilidad de desbordamiento de entero en la funci\\u00f3n do_io_submit en fs/aio.c del kernel Linux anterior a v2.6.36-rc4-next-20100915, permite a usuarios locales provocar una denegaci\\u00f3n de servicio o posiblemente tenga otro impacto sin especificar a trav\\u00e9s del uso de una llamada de sistema io_submit.\"}]",
"id": "CVE-2010-3067",
"lastModified": "2024-11-21T01:17:58.120",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:L/AC:L/Au:N/C:N/I:N/A:C\", \"baseScore\": 4.9, \"accessVector\": \"LOCAL\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 3.9, \"impactScore\": 6.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2010-09-21T18:00:05.707",
"references": "[{\"url\": \"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=75e1c70fc31490ef8a373ea2a4bea2524099b478\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/42778\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/42801\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/42890\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/43291\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/46397\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.debian.org/security/2010/dsa-2126\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.36-rc4-next-20100915.bz2\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2010:257\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2011:029\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2011:051\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2010-0758.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2010-0779.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2010-0839.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2011-0007.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.securityfocus.com/archive/1/520102/100/0/threaded\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.ubuntu.com/usn/USN-1000-1\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vmware.com/security/advisories/VMSA-2011-0012.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2011/0012\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2011/0298\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2011/0375\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=629441\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Issue Tracking\", \"Third Party Advisory\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/61884\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=75e1c70fc31490ef8a373ea2a4bea2524099b478\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/42778\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/42801\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/42890\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/43291\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/46397\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.debian.org/security/2010/dsa-2126\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.36-rc4-next-20100915.bz2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2010:257\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2011:029\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2011:051\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2010-0758.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2010-0779.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2010-0839.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2011-0007.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.securityfocus.com/archive/1/520102/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.ubuntu.com/usn/USN-1000-1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vmware.com/security/advisories/VMSA-2011-0012.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2011/0012\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2011/0298\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2011/0375\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=629441\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Third Party Advisory\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/61884\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}]",
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-190\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2010-3067\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2010-09-21T18:00:05.707\",\"lastModified\":\"2026-04-29T01:13:23.040\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Integer overflow in the do_io_submit function in fs/aio.c in the Linux kernel before 2.6.36-rc4-next-20100915 allows local users to cause a denial of service or possibly have unspecified other impact via crafted use of the io_submit system call.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad de desbordamiento de entero en la funci\u00f3n do_io_submit en fs/aio.c del kernel Linux anterior a v2.6.36-rc4-next-20100915, permite a usuarios locales provocar una denegaci\u00f3n de servicio o posiblemente tenga otro impacto sin especificar a trav\u00e9s del uso de una llamada de sistema io_submit.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":4.9,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.9,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-190\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.6.36\",\"matchCriteriaId\":\"C8DCE5E2-B055-4F05-8F0F-F19D1B7BA8D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4407EF9-4ECF-408F-9ECB-0705E3FB65D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBE26099-6D2C-4FAF-B15C-CBF985D59171\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2C193FF-3723-4BE9-8787-DED7D455FA8F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"F874FE6A-968D-47E1-900A-E154E41EDAF8\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A01C8B7E-EB19-40EA-B1D2-9AE5EA536C95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5646FDE9-CF21-46A9-B89D-F5BBDB4249AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E496249-23A8-42FC-A109-634A54B5600F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"640FB29C-1A84-41E1-86DE-B542EA0EF153\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CD2D897-E321-4CED-92E0-11A98B52053C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*\",\"matchCriteriaId\":\"25CBACD3-AFB7-410D-927F-0C1FF477D396\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DB8A616-865B-4E70-BA2E-BE5F0BA7A351\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C757774-08E7-40AA-B532-6F705C8F7639\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"454A5D17-B171-4F1F-9E0B-F18D1E5CA9FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*\",\"matchCriteriaId\":\"7EBFE35C-E243-43D1-883D-4398D71763CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5D026D0-EF78-438D-BEDD-FC8571F3ACEB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2BCB73E-27BB-4878-AD9C-90C4F20C25A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*\",\"matchCriteriaId\":\"01EDA41C-6B2E-49AF-B503-EB3882265C11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87614B58-24AB-49FB-9C84-E8DDBA16353B\"}]}]}],\"references\":[{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=75e1c70fc31490ef8a373ea2a4bea2524099b478\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/42778\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/42801\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/42890\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/43291\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/46397\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2010/dsa-2126\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.36-rc4-next-20100915.bz2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2010:257\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2011:029\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2011:051\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0758.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0779.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0839.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0007.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/archive/1/520102/100/0/threaded\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-1000-1\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2011-0012.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0012\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0298\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0375\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=629441\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/61884\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=75e1c70fc31490ef8a373ea2a4bea2524099b478\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/42778\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/42801\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/42890\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/43291\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/46397\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2010/dsa-2126\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.36-rc4-next-20100915.bz2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2010:257\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2011:029\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2011:051\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0758.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0779.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0839.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0007.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/archive/1/520102/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-1000-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2011-0012.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0012\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0298\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0375\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=629441\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/61884\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]}]}}"
}
}
CERTA-2011-AVI-571
Vulnerability from certfr_avis - Published: - Updated:
De nombreuses vulnérabilités présentes dans des bibliothèques tierces parties utilisées par VMWare ESX et VMWare ESXi ont été corrigées.
Description
VMWare a corrigé un nombre conséquent de vulnérabilités dans des bibliothèques tierces utilisées par VMWare ESX et VMWare ESXi.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |
|---|---|---|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "VMWare ESXi 4.0.",
"product": {
"name": "ESXi",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMWare ESX 4.0 ;",
"product": {
"name": "ESXi",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nVMWare a corrig\u00e9 un nombre cons\u00e9quent de vuln\u00e9rabilit\u00e9s dans des\nbiblioth\u00e8ques tierces utilis\u00e9es par VMWare ESX et VMWare ESXi.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2010-1083",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1083"
},
{
"name": "CVE-2011-1010",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1010"
},
{
"name": "CVE-2010-4346",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4346"
},
{
"name": "CVE-2010-3477",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3477"
},
{
"name": "CVE-2010-4263",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4263"
},
{
"name": "CVE-2010-3859",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3859"
},
{
"name": "CVE-2011-1494",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1494"
},
{
"name": "CVE-2010-4255",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4255"
},
{
"name": "CVE-2010-2938",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2938"
},
{
"name": "CVE-2010-4072",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4072"
},
{
"name": "CVE-2010-4655",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4655"
},
{
"name": "CVE-2010-3865",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3865"
},
{
"name": "CVE-2010-4343",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4343"
},
{
"name": "CVE-2010-3877",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3877"
},
{
"name": "CVE-2011-1659",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1659"
},
{
"name": "CVE-2010-4526",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4526"
},
{
"name": "CVE-2010-0296",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0296"
},
{
"name": "CVE-2010-4249",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4249"
},
{
"name": "CVE-2010-4251",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4251"
},
{
"name": "CVE-2010-3086",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3086"
},
{
"name": "CVE-2011-0282",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0282"
},
{
"name": "CVE-2011-1090",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1090"
},
{
"name": "CVE-2010-3442",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3442"
},
{
"name": "CVE-2010-4161",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4161"
},
{
"name": "CVE-2010-3015",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3015"
},
{
"name": "CVE-2011-1478",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1478"
},
{
"name": "CVE-2010-4157",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4157"
},
{
"name": "CVE-2011-0536",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0536"
},
{
"name": "CVE-2010-3699",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3699"
},
{
"name": "CVE-2010-3066",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3066"
},
{
"name": "CVE-2010-3067",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3067"
},
{
"name": "CVE-2010-4248",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4248"
},
{
"name": "CVE-2010-2942",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2942"
},
{
"name": "CVE-2010-4243",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4243"
},
{
"name": "CVE-2011-1658",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1658"
},
{
"name": "CVE-2010-3880",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3880"
},
{
"name": "CVE-2010-3858",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3858"
},
{
"name": "CVE-2010-3904",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3904"
},
{
"name": "CVE-2010-4247",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4247"
},
{
"name": "CVE-2010-3296",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3296"
},
{
"name": "CVE-2010-3078",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3078"
},
{
"name": "CVE-2010-4073",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4073"
},
{
"name": "CVE-2011-1071",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1071"
},
{
"name": "CVE-2010-1323",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1323"
},
{
"name": "CVE-2011-0521",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0521"
},
{
"name": "CVE-2010-4075",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4075"
},
{
"name": "CVE-2010-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4083"
},
{
"name": "CVE-2011-0281",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0281"
},
{
"name": "CVE-2010-4081",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4081"
},
{
"name": "CVE-2010-2492",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2492"
},
{
"name": "CVE-2010-3876",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3876"
},
{
"name": "CVE-2011-1095",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1095"
},
{
"name": "CVE-2010-4080",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4080"
},
{
"name": "CVE-2010-4238",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4238"
},
{
"name": "CVE-2010-4242",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4242"
},
{
"name": "CVE-2010-2798",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2798"
},
{
"name": "CVE-2011-0710",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0710"
},
{
"name": "CVE-2010-4158",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4158"
},
{
"name": "CVE-2010-3432",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3432"
},
{
"name": "CVE-2010-2943",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2943"
},
{
"name": "CVE-2011-1495",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1495"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 VMware VMSA-2011-0012 du 12 octobre 2011 :",
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html"
}
],
"reference": "CERTA-2011-AVI-571",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2011-10-18T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De nombreuses vuln\u00e9rabilit\u00e9s pr\u00e9sentes dans des biblioth\u00e8ques tierces\nparties utilis\u00e9es par \u003cspan class=\"textit\"\u003eVMWare ESX\u003c/span\u003e et \u003cspan\nclass=\"textit\"\u003eVMWare ESXi\u003c/span\u003e ont \u00e9t\u00e9 corrig\u00e9es.\n",
"title": "Vuln\u00e9rabilit\u00e9s dans VMWare ESX et ESXi",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMWare WMSA-2011-0012 du 12 octobre 2011",
"url": null
}
]
}
CERTA-2011-AVI-571
Vulnerability from certfr_avis - Published: - Updated:
De nombreuses vulnérabilités présentes dans des bibliothèques tierces parties utilisées par VMWare ESX et VMWare ESXi ont été corrigées.
Description
VMWare a corrigé un nombre conséquent de vulnérabilités dans des bibliothèques tierces utilisées par VMWare ESX et VMWare ESXi.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |
|---|---|---|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "VMWare ESXi 4.0.",
"product": {
"name": "ESXi",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMWare ESX 4.0 ;",
"product": {
"name": "ESXi",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nVMWare a corrig\u00e9 un nombre cons\u00e9quent de vuln\u00e9rabilit\u00e9s dans des\nbiblioth\u00e8ques tierces utilis\u00e9es par VMWare ESX et VMWare ESXi.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2010-1083",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1083"
},
{
"name": "CVE-2011-1010",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1010"
},
{
"name": "CVE-2010-4346",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4346"
},
{
"name": "CVE-2010-3477",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3477"
},
{
"name": "CVE-2010-4263",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4263"
},
{
"name": "CVE-2010-3859",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3859"
},
{
"name": "CVE-2011-1494",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1494"
},
{
"name": "CVE-2010-4255",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4255"
},
{
"name": "CVE-2010-2938",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2938"
},
{
"name": "CVE-2010-4072",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4072"
},
{
"name": "CVE-2010-4655",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4655"
},
{
"name": "CVE-2010-3865",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3865"
},
{
"name": "CVE-2010-4343",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4343"
},
{
"name": "CVE-2010-3877",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3877"
},
{
"name": "CVE-2011-1659",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1659"
},
{
"name": "CVE-2010-4526",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4526"
},
{
"name": "CVE-2010-0296",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0296"
},
{
"name": "CVE-2010-4249",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4249"
},
{
"name": "CVE-2010-4251",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4251"
},
{
"name": "CVE-2010-3086",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3086"
},
{
"name": "CVE-2011-0282",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0282"
},
{
"name": "CVE-2011-1090",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1090"
},
{
"name": "CVE-2010-3442",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3442"
},
{
"name": "CVE-2010-4161",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4161"
},
{
"name": "CVE-2010-3015",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3015"
},
{
"name": "CVE-2011-1478",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1478"
},
{
"name": "CVE-2010-4157",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4157"
},
{
"name": "CVE-2011-0536",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0536"
},
{
"name": "CVE-2010-3699",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3699"
},
{
"name": "CVE-2010-3066",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3066"
},
{
"name": "CVE-2010-3067",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3067"
},
{
"name": "CVE-2010-4248",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4248"
},
{
"name": "CVE-2010-2942",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2942"
},
{
"name": "CVE-2010-4243",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4243"
},
{
"name": "CVE-2011-1658",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1658"
},
{
"name": "CVE-2010-3880",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3880"
},
{
"name": "CVE-2010-3858",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3858"
},
{
"name": "CVE-2010-3904",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3904"
},
{
"name": "CVE-2010-4247",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4247"
},
{
"name": "CVE-2010-3296",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3296"
},
{
"name": "CVE-2010-3078",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3078"
},
{
"name": "CVE-2010-4073",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4073"
},
{
"name": "CVE-2011-1071",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1071"
},
{
"name": "CVE-2010-1323",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1323"
},
{
"name": "CVE-2011-0521",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0521"
},
{
"name": "CVE-2010-4075",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4075"
},
{
"name": "CVE-2010-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4083"
},
{
"name": "CVE-2011-0281",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0281"
},
{
"name": "CVE-2010-4081",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4081"
},
{
"name": "CVE-2010-2492",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2492"
},
{
"name": "CVE-2010-3876",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3876"
},
{
"name": "CVE-2011-1095",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1095"
},
{
"name": "CVE-2010-4080",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4080"
},
{
"name": "CVE-2010-4238",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4238"
},
{
"name": "CVE-2010-4242",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4242"
},
{
"name": "CVE-2010-2798",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2798"
},
{
"name": "CVE-2011-0710",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0710"
},
{
"name": "CVE-2010-4158",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4158"
},
{
"name": "CVE-2010-3432",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3432"
},
{
"name": "CVE-2010-2943",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2943"
},
{
"name": "CVE-2011-1495",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1495"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 VMware VMSA-2011-0012 du 12 octobre 2011 :",
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html"
}
],
"reference": "CERTA-2011-AVI-571",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2011-10-18T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De nombreuses vuln\u00e9rabilit\u00e9s pr\u00e9sentes dans des biblioth\u00e8ques tierces\nparties utilis\u00e9es par \u003cspan class=\"textit\"\u003eVMWare ESX\u003c/span\u003e et \u003cspan\nclass=\"textit\"\u003eVMWare ESXi\u003c/span\u003e ont \u00e9t\u00e9 corrig\u00e9es.\n",
"title": "Vuln\u00e9rabilit\u00e9s dans VMWare ESX et ESXi",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMWare WMSA-2011-0012 du 12 octobre 2011",
"url": null
}
]
}
CNVD-2010-2096
Vulnerability from cnvd - Published: 2020-03-25目前厂商已发布升级相关漏洞补丁链接,请及时更新: http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff_plain;h=75e1c70fc31490ef8a373ea2a4bea2524099b478
| Name | Linux kernel <2.6.36-rc4-next-20100915 |
|---|
{
"bids": {
"bid": {
"bidNumber": "43353"
}
},
"cves": {
"cve": {
"cveNumber": "CVE-2010-3067",
"cveUrl": "https://bugzilla.redhat.com/show_bug.cgi?id=629441http://xforce.iss.net/xforce/xfdb/61884"
}
},
"description": "Linux Kernel\u662f\u5f00\u6e90\u64cd\u4f5c\u7cfb\u7edfLinux\u6240\u4f7f\u7528\u7684\u5185\u6838\u3002\n\nLinux kernel 2.6.36-rc4-next-20100915\u4e4b\u524d\u7684\u7248\u672c\u4e2d\u7684fs/aio.c\u6587\u4ef6\u4e2d\u7684do_io_submit\u51fd\u6570\u4e2d\u5b58\u5728\u6574\u6570\u6ea2\u51fa\u6f0f\u6d1e\u3002\u672c\u5730\u7528\u6237\u53ef\u4ee5\u501f\u52a9\u7279\u5236io_submit\u7cfb\u7edf\u8c03\u7528\u7684\u4f7f\u7528\u5bfc\u81f4\u62d2\u7edd\u670d\u52a1\uff0c\u4e5f\u6709\u53ef\u80fd\u5f15\u8d77\u5176\u4ed6\u672a\u660e\u5f71\u54cd\u3002",
"discovererName": "Tavis Ormandy",
"formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u76f8\u5173\u6f0f\u6d1e\u8865\u4e01\u94fe\u63a5\uff0c\u8bf7\u53ca\u65f6\u66f4\u65b0\uff1a\r\nhttp://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff_plain;h=75e1c70fc31490ef8a373ea2a4bea2524099b478",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2010-2096",
"openTime": "2020-03-25",
"patchDescription": "Linux Kernel\u662f\u5f00\u6e90\u64cd\u4f5c\u7cfb\u7edfLinux\u6240\u4f7f\u7528\u7684\u5185\u6838\u3002\r\n\r\nLinux kernel 2.6.36-rc4-next-20100915\u4e4b\u524d\u7684\u7248\u672c\u4e2d\u7684fs/aio.c\u6587\u4ef6\u4e2d\u7684do_io_submit\u51fd\u6570\u4e2d\u5b58\u5728\u6574\u6570\u6ea2\u51fa\u6f0f\u6d1e\u3002\u672c\u5730\u7528\u6237\u53ef\u4ee5\u501f\u52a9\u7279\u5236io_submit\u7cfb\u7edf\u8c03\u7528\u7684\u4f7f\u7528\u5bfc\u81f4\u62d2\u7edd\u670d\u52a1\uff0c\u4e5f\u6709\u53ef\u80fd\u5f15\u8d77\u5176\u4ed6\u672a\u660e\u5f71\u54cd\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Linux Kernel \u0027do_io_submit()\u0027\u6574\u6570\u6ea2\u51fa\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": "Linux kernel \u003c2.6.36-rc4-next-20100915"
},
"referenceLink": "https://bugzilla.redhat.com/show_bug.cgi?id=629441http://xforce.iss.net/xforce/xfdb/61884",
"serverity": "\u4f4e",
"submitTime": "2010-09-24",
"title": "Linux Kernel \u0027do_io_submit()\u0027\u6574\u6570\u6ea2\u51fa\u6f0f\u6d1e"
}
FKIE_CVE-2010-3067
Vulnerability from fkie_nvd - Published: 2010-09-21 18:00 - Updated: 2026-04-29 01:13| Vendor | Product | Version | |
|---|---|---|---|
| linux | linux_kernel | * | |
| linux | linux_kernel | 2.6.36 | |
| linux | linux_kernel | 2.6.36 | |
| linux | linux_kernel | 2.6.36 | |
| linux | linux_kernel | 2.6.36 | |
| opensuse | opensuse | 11.2 | |
| opensuse | opensuse | 11.3 | |
| suse | linux_enterprise_desktop | 10 | |
| suse | linux_enterprise_real_time_extension | 11 | |
| suse | linux_enterprise_server | 9 | |
| suse | linux_enterprise_server | 10 | |
| suse | linux_enterprise_software_development_kit | 10 | |
| debian | debian_linux | 5.0 | |
| canonical | ubuntu_linux | 6.06 | |
| canonical | ubuntu_linux | 8.04 | |
| canonical | ubuntu_linux | 9.04 | |
| canonical | ubuntu_linux | 9.10 | |
| canonical | ubuntu_linux | 10.04 | |
| canonical | ubuntu_linux | 10.10 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C8DCE5E2-B055-4F05-8F0F-F19D1B7BA8D7",
"versionEndExcluding": "2.6.36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*",
"matchCriteriaId": "D4407EF9-4ECF-408F-9ECB-0705E3FB65D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*",
"matchCriteriaId": "DBE26099-6D2C-4FAF-B15C-CBF985D59171",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*",
"matchCriteriaId": "F2C193FF-3723-4BE9-8787-DED7D455FA8F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*",
"matchCriteriaId": "F874FE6A-968D-47E1-900A-E154E41EDAF8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A01C8B7E-EB19-40EA-B1D2-9AE5EA536C95",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*",
"matchCriteriaId": "5646FDE9-CF21-46A9-B89D-F5BBDB4249AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*",
"matchCriteriaId": "1E496249-23A8-42FC-A109-634A54B5600F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*",
"matchCriteriaId": "640FB29C-1A84-41E1-86DE-B542EA0EF153",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*",
"matchCriteriaId": "4CD2D897-E321-4CED-92E0-11A98B52053C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*",
"matchCriteriaId": "25CBACD3-AFB7-410D-927F-0C1FF477D396",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*",
"matchCriteriaId": "3DB8A616-865B-4E70-BA2E-BE5F0BA7A351",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8C757774-08E7-40AA-B532-6F705C8F7639",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
"matchCriteriaId": "454A5D17-B171-4F1F-9E0B-F18D1E5CA9FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*",
"matchCriteriaId": "7EBFE35C-E243-43D1-883D-4398D71763CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*",
"matchCriteriaId": "A5D026D0-EF78-438D-BEDD-FC8571F3ACEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*",
"matchCriteriaId": "A2BCB73E-27BB-4878-AD9C-90C4F20C25A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
"matchCriteriaId": "01EDA41C-6B2E-49AF-B503-EB3882265C11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*",
"matchCriteriaId": "87614B58-24AB-49FB-9C84-E8DDBA16353B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Integer overflow in the do_io_submit function in fs/aio.c in the Linux kernel before 2.6.36-rc4-next-20100915 allows local users to cause a denial of service or possibly have unspecified other impact via crafted use of the io_submit system call."
},
{
"lang": "es",
"value": "Vulnerabilidad de desbordamiento de entero en la funci\u00f3n do_io_submit en fs/aio.c del kernel Linux anterior a v2.6.36-rc4-next-20100915, permite a usuarios locales provocar una denegaci\u00f3n de servicio o posiblemente tenga otro impacto sin especificar a trav\u00e9s del uso de una llamada de sistema io_submit."
}
],
"id": "CVE-2010-3067",
"lastModified": "2026-04-29T01:13:23.040",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 4.9,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2010-09-21T18:00:05.707",
"references": [
{
"source": "secalert@redhat.com",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=75e1c70fc31490ef8a373ea2a4bea2524099b478"
},
{
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/42778"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/42801"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/42890"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/43291"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/46397"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2010/dsa-2126"
},
{
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
],
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.36-rc4-next-20100915.bz2"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:257"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:029"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:051"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.redhat.com/support/errata/RHSA-2010-0758.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.redhat.com/support/errata/RHSA-2010-0779.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.redhat.com/support/errata/RHSA-2010-0839.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.redhat.com/support/errata/RHSA-2011-0007.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ubuntu.com/usn/USN-1000-1"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2011/0012"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2011/0298"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2011/0375"
},
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=629441"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61884"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=75e1c70fc31490ef8a373ea2a4bea2524099b478"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/42778"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/42801"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/42890"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/43291"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/46397"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2010/dsa-2126"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.36-rc4-next-20100915.bz2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:257"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:029"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:051"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.redhat.com/support/errata/RHSA-2010-0758.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.redhat.com/support/errata/RHSA-2010-0779.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.redhat.com/support/errata/RHSA-2010-0839.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.redhat.com/support/errata/RHSA-2011-0007.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ubuntu.com/usn/USN-1000-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2011/0012"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2011/0298"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2011/0375"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=629441"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61884"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-190"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-446W-Q44C-4XJ9
Vulnerability from github – Published: 2022-05-13 01:23 – Updated: 2022-05-13 01:23Integer overflow in the do_io_submit function in fs/aio.c in the Linux kernel before 2.6.36-rc4-next-20100915 allows local users to cause a denial of service or possibly have unspecified other impact via crafted use of the io_submit system call.
{
"affected": [],
"aliases": [
"CVE-2010-3067"
],
"database_specific": {
"cwe_ids": [
"CWE-190"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2010-09-21T18:00:00Z",
"severity": "MODERATE"
},
"details": "Integer overflow in the do_io_submit function in fs/aio.c in the Linux kernel before 2.6.36-rc4-next-20100915 allows local users to cause a denial of service or possibly have unspecified other impact via crafted use of the io_submit system call.",
"id": "GHSA-446w-q44c-4xj9",
"modified": "2022-05-13T01:23:37Z",
"published": "2022-05-13T01:23:37Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3067"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=629441"
},
{
"type": "WEB",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61884"
},
{
"type": "WEB",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=75e1c70fc31490ef8a373ea2a4bea2524099b478"
},
{
"type": "WEB",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=75e1c70fc31490ef8a373ea2a4bea2524099b478"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/42778"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/42801"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/42890"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/43291"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/46397"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2010/dsa-2126"
},
{
"type": "WEB",
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.36-rc4-next-20100915.bz2"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:257"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:029"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:051"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0758.html"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0779.html"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0839.html"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0007.html"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded"
},
{
"type": "WEB",
"url": "http://www.ubuntu.com/usn/USN-1000-1"
},
{
"type": "WEB",
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2011/0012"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2011/0298"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2011/0375"
}
],
"schema_version": "1.4.0",
"severity": []
}
GSD-2010-3067
Vulnerability from gsd - Updated: 2023-12-13 01:21{
"GSD": {
"alias": "CVE-2010-3067",
"description": "Integer overflow in the do_io_submit function in fs/aio.c in the Linux kernel before 2.6.36-rc4-next-20100915 allows local users to cause a denial of service or possibly have unspecified other impact via crafted use of the io_submit system call.",
"id": "GSD-2010-3067",
"references": [
"https://www.suse.com/security/cve/CVE-2010-3067.html",
"https://www.debian.org/security/2010/dsa-2126",
"https://access.redhat.com/errata/RHSA-2011:0007",
"https://access.redhat.com/errata/RHSA-2010:0839",
"https://access.redhat.com/errata/RHSA-2010:0779",
"https://access.redhat.com/errata/RHSA-2010:0758",
"https://linux.oracle.com/cve/CVE-2010-3067.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2010-3067"
],
"details": "Integer overflow in the do_io_submit function in fs/aio.c in the Linux kernel before 2.6.36-rc4-next-20100915 allows local users to cause a denial of service or possibly have unspecified other impact via crafted use of the io_submit system call.",
"id": "GSD-2010-3067",
"modified": "2023-12-13T01:21:33.756513Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-3067",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Integer overflow in the do_io_submit function in fs/aio.c in the Linux kernel before 2.6.36-rc4-next-20100915 allows local users to cause a denial of service or possibly have unspecified other impact via crafted use of the io_submit system call."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:051",
"refsource": "MISC",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:051"
},
{
"name": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html",
"refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html"
},
{
"name": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html",
"refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html"
},
{
"name": "http://www.ubuntu.com/usn/USN-1000-1",
"refsource": "MISC",
"url": "http://www.ubuntu.com/usn/USN-1000-1"
},
{
"name": "http://www.vupen.com/english/advisories/2011/0298",
"refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2011/0298"
},
{
"name": "http://secunia.com/advisories/42890",
"refsource": "MISC",
"url": "http://secunia.com/advisories/42890"
},
{
"name": "http://www.redhat.com/support/errata/RHSA-2011-0007.html",
"refsource": "MISC",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0007.html"
},
{
"name": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html",
"refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html"
},
{
"name": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html",
"refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html"
},
{
"name": "http://secunia.com/advisories/42778",
"refsource": "MISC",
"url": "http://secunia.com/advisories/42778"
},
{
"name": "http://secunia.com/advisories/42801",
"refsource": "MISC",
"url": "http://secunia.com/advisories/42801"
},
{
"name": "http://www.debian.org/security/2010/dsa-2126",
"refsource": "MISC",
"url": "http://www.debian.org/security/2010/dsa-2126"
},
{
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:029",
"refsource": "MISC",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:029"
},
{
"name": "http://www.vupen.com/english/advisories/2011/0012",
"refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2011/0012"
},
{
"name": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html",
"refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html"
},
{
"name": "http://secunia.com/advisories/43291",
"refsource": "MISC",
"url": "http://secunia.com/advisories/43291"
},
{
"name": "http://secunia.com/advisories/46397",
"refsource": "MISC",
"url": "http://secunia.com/advisories/46397"
},
{
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:257",
"refsource": "MISC",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:257"
},
{
"name": "http://www.securityfocus.com/archive/1/520102/100/0/threaded",
"refsource": "MISC",
"url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html",
"refsource": "MISC",
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html"
},
{
"name": "http://www.vupen.com/english/advisories/2011/0375",
"refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2011/0375"
},
{
"name": "http://www.redhat.com/support/errata/RHSA-2010-0758.html",
"refsource": "MISC",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0758.html"
},
{
"name": "http://www.redhat.com/support/errata/RHSA-2010-0779.html",
"refsource": "MISC",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0779.html"
},
{
"name": "http://www.redhat.com/support/errata/RHSA-2010-0839.html",
"refsource": "MISC",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0839.html"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=75e1c70fc31490ef8a373ea2a4bea2524099b478",
"refsource": "MISC",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=75e1c70fc31490ef8a373ea2a4bea2524099b478"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.36-rc4-next-20100915.bz2",
"refsource": "MISC",
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.36-rc4-next-20100915.bz2"
},
{
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61884",
"refsource": "MISC",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61884"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=629441",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=629441"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.6.36",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-3067"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Integer overflow in the do_io_submit function in fs/aio.c in the Linux kernel before 2.6.36-rc4-next-20100915 allows local users to cause a denial of service or possibly have unspecified other impact via crafted use of the io_submit system call."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-190"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=629441",
"refsource": "CONFIRM",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=629441"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.36-rc4-next-20100915.bz2",
"refsource": "CONFIRM",
"tags": [
"Broken Link"
],
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.36-rc4-next-20100915.bz2"
},
{
"name": "RHSA-2010:0758",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "http://www.redhat.com/support/errata/RHSA-2010-0758.html"
},
{
"name": "RHSA-2010:0779",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "http://www.redhat.com/support/errata/RHSA-2010-0779.html"
},
{
"name": "USN-1000-1",
"refsource": "UBUNTU",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ubuntu.com/usn/USN-1000-1"
},
{
"name": "SUSE-SA:2011:002",
"refsource": "SUSE",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html"
},
{
"name": "DSA-2126",
"refsource": "DEBIAN",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2010/dsa-2126"
},
{
"name": "SUSE-SA:2011:001",
"refsource": "SUSE",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html"
},
{
"name": "42801",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/42801"
},
{
"name": "ADV-2011-0012",
"refsource": "VUPEN",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2011/0012"
},
{
"name": "42778",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/42778"
},
{
"name": "MDVSA-2010:257",
"refsource": "MANDRIVA",
"tags": [
"Third Party Advisory"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:257"
},
{
"name": "RHSA-2010:0839",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "http://www.redhat.com/support/errata/RHSA-2010-0839.html"
},
{
"name": "SUSE-SA:2010:060",
"refsource": "SUSE",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html"
},
{
"name": "RHSA-2011:0007",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "http://www.redhat.com/support/errata/RHSA-2011-0007.html"
},
{
"name": "42890",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/42890"
},
{
"name": "43291",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/43291"
},
{
"name": "ADV-2011-0375",
"refsource": "VUPEN",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2011/0375"
},
{
"name": "SUSE-SA:2011:008",
"refsource": "SUSE",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html"
},
{
"name": "ADV-2011-0298",
"refsource": "VUPEN",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2011/0298"
},
{
"name": "SUSE-SA:2011:007",
"refsource": "SUSE",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html"
},
{
"name": "MDVSA-2011:029",
"refsource": "MANDRIVA",
"tags": [
"Third Party Advisory"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:029"
},
{
"name": "MDVSA-2011:051",
"refsource": "MANDRIVA",
"tags": [
"Third Party Advisory"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:051"
},
{
"name": "46397",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/46397"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html"
},
{
"name": "kernel-doiosubmit-dos(61884)",
"refsource": "XF",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61884"
},
{
"name": "20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console",
"refsource": "BUGTRAQ",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=75e1c70fc31490ef8a373ea2a4bea2524099b478",
"refsource": "MISC",
"tags": [],
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=75e1c70fc31490ef8a373ea2a4bea2524099b478"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 4.9,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2023-02-13T04:21Z",
"publishedDate": "2010-09-21T18:00Z"
}
}
}
RHSA-2010:0758
Vulnerability from csaf_redhat - Published: 2010-10-08 02:08 - Updated: 2025-11-21 17:36Integer overflow in the do_io_submit function in fs/aio.c in the Linux kernel before 2.6.36-rc4-next-20100915 allows local users to cause a denial of service or possibly have unspecified other impact via crafted use of the io_submit system call.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-169.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-169.el5rt.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-169.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-169.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-169.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-169.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-169.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-169.el5rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-169.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-169.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-169.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-169.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.x86_64 | — |
Vendor Fix
fix
|
The compat_alloc_user_space functions in include/asm/compat.h files in the Linux kernel before 2.6.36-rc4-git2 on 64-bit platforms do not properly allocate the userspace memory required for the 32-bit compatibility layer, which allows local users to gain privileges by leveraging the ability of the compat_mc_getsockopt function (aka the MCAST_MSFILTER getsockopt support) to control a certain length value, related to a "stack pointer underflow" issue, as exploited in the wild in September 2010.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-169.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-169.el5rt.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-169.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-169.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-169.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-169.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-169.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-169.el5rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-169.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-169.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-169.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-169.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated kernel-rt packages that fix two security issues and three bugs are\nnow available for Red Hat Enterprise MRG 1.2.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues:\n\n* The compat_alloc_user_space() function in the Linux kernel 32/64-bit\ncompatibility layer implementation was missing sanity checks. This function\ncould be abused in other areas of the Linux kernel if its length argument\ncan be controlled from user-space. On 64-bit systems, a local, unprivileged\nuser could use this flaw to escalate their privileges. (CVE-2010-3081,\nImportant)\n\n* A missing upper bound integer check was found in the sys_io_submit()\nfunction in the Linux kernel asynchronous I/O implementation. A local,\nunprivileged user could use this flaw to cause an information leak.\n(CVE-2010-3067, Low)\n\nRed Hat would like to thank Ben Hawkes for reporting CVE-2010-3081, and\nTavis Ormandy for reporting CVE-2010-3067.\n\nThis update also fixes the following bugs:\n\n* The RHSA-2010:0631 kernel-rt update resolved an issue (CVE-2010-2240)\nwhere, when an application has a stack overflow, the stack could silently\noverwrite another memory mapped area instead of a segmentation fault\noccurring. This update implements the official upstream fixes for that\nissue. Note: This is not a security regression. The original fix was\ncomplete. (BZ#624604)\n\n* In certain circumstances, under heavy load, certain network interface\ncards using the bnx2 driver, and configured to use MSI-X, could stop\nprocessing interrupts and then network connectivity would cease.\n(BZ#622952)\n\n* This update upgrades the tg3 driver to version 3.110. (BZ#640334)\n\nUsers are advised to upgrade to these updated packages, which contain\nbackported patches to correct these issues. The system must be rebooted for\nthis update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2010:0758",
"url": "https://access.redhat.com/errata/RHSA-2010:0758"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/kb/docs/DOC-40265",
"url": "https://access.redhat.com/kb/docs/DOC-40265"
},
{
"category": "external",
"summary": "624604",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=624604"
},
{
"category": "external",
"summary": "629441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=629441"
},
{
"category": "external",
"summary": "634457",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=634457"
},
{
"category": "external",
"summary": "640334",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=640334"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0758.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2025-11-21T17:36:48+00:00",
"generator": {
"date": "2025-11-21T17:36:48+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2010:0758",
"initial_release_date": "2010-10-08T02:08:00+00:00",
"revision_history": [
{
"date": "2010-10-08T02:08:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2010-10-07T22:12:02+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:36:48+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "MRG Realtime for RHEL 5 Server",
"product": {
"name": "MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_mrg:1::el5"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise MRG for RHEL-5"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-trace-0:2.6.24.7-169.el5rt.i686",
"product": {
"name": "kernel-rt-trace-0:2.6.24.7-169.el5rt.i686",
"product_id": "kernel-rt-trace-0:2.6.24.7-169.el5rt.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace@2.6.24.7-169.el5rt?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.i686",
"product": {
"name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.i686",
"product_id": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@2.6.24.7-169.el5rt?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.i686",
"product": {
"name": "kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.i686",
"product_id": "kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@2.6.24.7-169.el5rt?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.i686",
"product": {
"name": "kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.i686",
"product_id": "kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@2.6.24.7-169.el5rt?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.i686",
"product": {
"name": "kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.i686",
"product_id": "kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@2.6.24.7-169.el5rt?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.i686",
"product": {
"name": "kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.i686",
"product_id": "kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@2.6.24.7-169.el5rt?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.i686",
"product": {
"name": "kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.i686",
"product_id": "kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-devel@2.6.24.7-169.el5rt?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:2.6.24.7-169.el5rt.i686",
"product": {
"name": "kernel-rt-debug-0:2.6.24.7-169.el5rt.i686",
"product_id": "kernel-rt-debug-0:2.6.24.7-169.el5rt.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@2.6.24.7-169.el5rt?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.i686",
"product": {
"name": "kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.i686",
"product_id": "kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common@2.6.24.7-169.el5rt?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-0:2.6.24.7-169.el5rt.i686",
"product": {
"name": "kernel-rt-0:2.6.24.7-169.el5rt.i686",
"product_id": "kernel-rt-0:2.6.24.7-169.el5rt.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-169.el5rt?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.i686",
"product": {
"name": "kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.i686",
"product_id": "kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@2.6.24.7-169.el5rt?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:2.6.24.7-169.el5rt.i686",
"product": {
"name": "kernel-rt-devel-0:2.6.24.7-169.el5rt.i686",
"product_id": "kernel-rt-devel-0:2.6.24.7-169.el5rt.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@2.6.24.7-169.el5rt?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-vanilla-0:2.6.24.7-169.el5rt.i686",
"product": {
"name": "kernel-rt-vanilla-0:2.6.24.7-169.el5rt.i686",
"product_id": "kernel-rt-vanilla-0:2.6.24.7-169.el5rt.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-vanilla@2.6.24.7-169.el5rt?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-trace-0:2.6.24.7-169.el5rt.x86_64",
"product": {
"name": "kernel-rt-trace-0:2.6.24.7-169.el5rt.x86_64",
"product_id": "kernel-rt-trace-0:2.6.24.7-169.el5rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace@2.6.24.7-169.el5rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"product": {
"name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"product_id": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@2.6.24.7-169.el5rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"product": {
"name": "kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"product_id": "kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@2.6.24.7-169.el5rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@2.6.24.7-169.el5rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"product_id": "kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@2.6.24.7-169.el5rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.x86_64",
"product": {
"name": "kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.x86_64",
"product_id": "kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@2.6.24.7-169.el5rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.x86_64",
"product": {
"name": "kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.x86_64",
"product_id": "kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-devel@2.6.24.7-169.el5rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:2.6.24.7-169.el5rt.x86_64",
"product": {
"name": "kernel-rt-debug-0:2.6.24.7-169.el5rt.x86_64",
"product_id": "kernel-rt-debug-0:2.6.24.7-169.el5rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@2.6.24.7-169.el5rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.x86_64",
"product_id": "kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common@2.6.24.7-169.el5rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-0:2.6.24.7-169.el5rt.x86_64",
"product": {
"name": "kernel-rt-0:2.6.24.7-169.el5rt.x86_64",
"product_id": "kernel-rt-0:2.6.24.7-169.el5rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-169.el5rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.x86_64",
"product_id": "kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@2.6.24.7-169.el5rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:2.6.24.7-169.el5rt.x86_64",
"product": {
"name": "kernel-rt-devel-0:2.6.24.7-169.el5rt.x86_64",
"product_id": "kernel-rt-devel-0:2.6.24.7-169.el5rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@2.6.24.7-169.el5rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-vanilla-0:2.6.24.7-169.el5rt.x86_64",
"product": {
"name": "kernel-rt-vanilla-0:2.6.24.7-169.el5rt.x86_64",
"product_id": "kernel-rt-vanilla-0:2.6.24.7-169.el5rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-vanilla@2.6.24.7-169.el5rt?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-doc-0:2.6.24.7-169.el5rt.noarch",
"product": {
"name": "kernel-rt-doc-0:2.6.24.7-169.el5rt.noarch",
"product_id": "kernel-rt-doc-0:2.6.24.7-169.el5rt.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-doc@2.6.24.7-169.el5rt?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:2.6.24.7-169.el5rt.src",
"product": {
"name": "kernel-rt-0:2.6.24.7-169.el5rt.src",
"product_id": "kernel-rt-0:2.6.24.7-169.el5rt.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-169.el5rt?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:2.6.24.7-169.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-169.el5rt.i686"
},
"product_reference": "kernel-rt-0:2.6.24.7-169.el5rt.i686",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:2.6.24.7-169.el5rt.src as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-169.el5rt.src"
},
"product_reference": "kernel-rt-0:2.6.24.7-169.el5rt.src",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:2.6.24.7-169.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-169.el5rt.x86_64"
},
"product_reference": "kernel-rt-0:2.6.24.7-169.el5rt.x86_64",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:2.6.24.7-169.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-169.el5rt.i686"
},
"product_reference": "kernel-rt-debug-0:2.6.24.7-169.el5rt.i686",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:2.6.24.7-169.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-169.el5rt.x86_64"
},
"product_reference": "kernel-rt-debug-0:2.6.24.7-169.el5rt.x86_64",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.i686"
},
"product_reference": "kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.i686",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.i686"
},
"product_reference": "kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.i686",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.x86_64",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.i686"
},
"product_reference": "kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.i686",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.i686"
},
"product_reference": "kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.i686",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.x86_64",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:2.6.24.7-169.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-169.el5rt.i686"
},
"product_reference": "kernel-rt-devel-0:2.6.24.7-169.el5rt.i686",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:2.6.24.7-169.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-169.el5rt.x86_64"
},
"product_reference": "kernel-rt-devel-0:2.6.24.7-169.el5rt.x86_64",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-doc-0:2.6.24.7-169.el5rt.noarch as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-169.el5rt.noarch"
},
"product_reference": "kernel-rt-doc-0:2.6.24.7-169.el5rt.noarch",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-0:2.6.24.7-169.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-169.el5rt.i686"
},
"product_reference": "kernel-rt-trace-0:2.6.24.7-169.el5rt.i686",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-0:2.6.24.7-169.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-169.el5rt.x86_64"
},
"product_reference": "kernel-rt-trace-0:2.6.24.7-169.el5rt.x86_64",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.i686"
},
"product_reference": "kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.i686",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.x86_64"
},
"product_reference": "kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.i686"
},
"product_reference": "kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.i686",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.x86_64"
},
"product_reference": "kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.x86_64",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vanilla-0:2.6.24.7-169.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-169.el5rt.i686"
},
"product_reference": "kernel-rt-vanilla-0:2.6.24.7-169.el5rt.i686",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vanilla-0:2.6.24.7-169.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-169.el5rt.x86_64"
},
"product_reference": "kernel-rt-vanilla-0:2.6.24.7-169.el5rt.x86_64",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.i686"
},
"product_reference": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.i686",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.x86_64"
},
"product_reference": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.i686"
},
"product_reference": "kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.i686",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.x86_64"
},
"product_reference": "kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.x86_64",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Tavis Ormandy"
]
}
],
"cve": "CVE-2010-3067",
"discovery_date": "2010-09-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "629441"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in the do_io_submit function in fs/aio.c in the Linux kernel before 2.6.36-rc4-next-20100915 allows local users to cause a denial of service or possibly have unspecified other impact via crafted use of the io_submit system call.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: do_io_submit() infoleak",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-169.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-169.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2010-3067"
},
{
"category": "external",
"summary": "RHBZ#629441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=629441"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2010-3067",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3067"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3067",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3067"
}
],
"release_date": "2010-09-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-10-08T02:08:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-169.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-169.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0758"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-169.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-169.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: do_io_submit() infoleak"
},
{
"acknowledgments": [
{
"names": [
"Ben Hawkes"
]
}
],
"cve": "CVE-2010-3081",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2010-09-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "634457"
}
],
"notes": [
{
"category": "description",
"text": "The compat_alloc_user_space functions in include/asm/compat.h files in the Linux kernel before 2.6.36-rc4-git2 on 64-bit platforms do not properly allocate the userspace memory required for the 32-bit compatibility layer, which allows local users to gain privileges by leveraging the ability of the compat_mc_getsockopt function (aka the MCAST_MSFILTER getsockopt support) to control a certain length value, related to a \"stack pointer underflow\" issue, as exploited in the wild in September 2010.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: 64-bit Compatibility Mode Stack Pointer Underflow",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "More information can be found in this kbase: https://access.redhat.com/kb/docs/DOC-40265.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-169.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-169.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2010-3081"
},
{
"category": "external",
"summary": "RHBZ#634457",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=634457"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2010-3081",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3081"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3081",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3081"
}
],
"release_date": "2010-09-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-10-08T02:08:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-169.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-169.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0758"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"products": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-169.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-169.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: 64-bit Compatibility Mode Stack Pointer Underflow"
}
]
}
RHSA-2010:0779
Vulnerability from csaf_redhat - Published: 2010-10-19 18:46 - Updated: 2025-11-21 17:36The actions implementation in the network queueing functionality in the Linux kernel before 2.6.36-rc2 does not properly initialize certain structure members when performing dump operations, which allows local users to obtain potentially sensitive information from kernel memory via vectors related to (1) the tcf_gact_dump function in net/sched/act_gact.c, (2) the tcf_mirred_dump function in net/sched/act_mirred.c, (3) the tcf_nat_dump function in net/sched/act_nat.c, (4) the tcf_simp_dump function in net/sched/act_simple.c, and (5) the tcf_skbedit_dump function in net/sched/act_skbedit.c.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:kernel-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-89.31.1.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-89.31.1.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-89.31.1.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-89.31.1.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-89.31.1.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-89.31.1.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-89.31.1.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-89.31.1.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-89.31.1.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-89.31.1.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-89.31.1.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-doc-0:2.6.9-89.31.1.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-devel-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-89.31.1.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-89.31.1.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-89.31.1.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-89.31.1.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-89.31.1.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-89.31.1.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-89.31.1.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-89.31.1.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-doc-0:2.6.9-89.31.1.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-devel-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-89.31.1.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-89.31.1.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-89.31.1.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-89.31.1.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-89.31.1.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-89.31.1.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-89.31.1.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-89.31.1.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-89.31.1.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-89.31.1.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-89.31.1.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-89.31.1.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-89.31.1.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-doc-0:2.6.9-89.31.1.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-devel-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-89.31.1.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-89.31.1.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-89.31.1.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-89.31.1.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-89.31.1.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-89.31.1.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-89.31.1.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-89.31.1.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-89.31.1.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-89.31.1.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-89.31.1.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-89.31.1.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-89.31.1.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-doc-0:2.6.9-89.31.1.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-devel-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-89.31.1.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-89.31.1.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
Integer overflow in the do_io_submit function in fs/aio.c in the Linux kernel before 2.6.36-rc4-next-20100915 allows local users to cause a denial of service or possibly have unspecified other impact via crafted use of the io_submit system call.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:kernel-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-89.31.1.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-89.31.1.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-89.31.1.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-89.31.1.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-89.31.1.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-89.31.1.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-89.31.1.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-89.31.1.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-89.31.1.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-89.31.1.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-89.31.1.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-doc-0:2.6.9-89.31.1.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-devel-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-89.31.1.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-89.31.1.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-89.31.1.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-89.31.1.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-89.31.1.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-89.31.1.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-89.31.1.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-89.31.1.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-doc-0:2.6.9-89.31.1.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-devel-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-89.31.1.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-89.31.1.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-89.31.1.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-89.31.1.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-89.31.1.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-89.31.1.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-89.31.1.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-89.31.1.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-89.31.1.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-89.31.1.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-89.31.1.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-89.31.1.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-89.31.1.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-doc-0:2.6.9-89.31.1.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-devel-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-89.31.1.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-89.31.1.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-89.31.1.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-89.31.1.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-89.31.1.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-89.31.1.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-89.31.1.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-89.31.1.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-89.31.1.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-89.31.1.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-89.31.1.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-89.31.1.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-89.31.1.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-doc-0:2.6.9-89.31.1.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-devel-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-89.31.1.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-89.31.1.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
The tcf_act_police_dump function in net/sched/act_police.c in the actions implementation in the network queueing functionality in the Linux kernel before 2.6.36-rc4 does not properly initialize certain structure members, which allows local users to obtain potentially sensitive information from kernel memory via vectors involving a dump operation. NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-2942.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:kernel-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-89.31.1.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-89.31.1.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-89.31.1.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-89.31.1.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-89.31.1.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-89.31.1.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-89.31.1.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-89.31.1.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-89.31.1.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-89.31.1.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-89.31.1.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-doc-0:2.6.9-89.31.1.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-devel-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-89.31.1.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-89.31.1.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-89.31.1.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-89.31.1.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-89.31.1.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-89.31.1.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-89.31.1.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-89.31.1.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-doc-0:2.6.9-89.31.1.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-devel-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-89.31.1.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-89.31.1.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-89.31.1.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-89.31.1.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-89.31.1.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-89.31.1.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-89.31.1.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-89.31.1.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-89.31.1.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-89.31.1.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-89.31.1.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-89.31.1.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-89.31.1.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-doc-0:2.6.9-89.31.1.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-devel-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-89.31.1.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-89.31.1.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-89.31.1.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-89.31.1.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-89.31.1.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-89.31.1.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-89.31.1.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-89.31.1.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-89.31.1.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-89.31.1.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-89.31.1.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-89.31.1.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-89.31.1.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-doc-0:2.6.9-89.31.1.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-devel-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-89.31.1.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-89.31.1.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-89.31.1.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-89.31.1.EL.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated kernel packages that fix multiple security issues and several bugs\nare now available for Red Hat Enterprise Linux 4.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues:\n\n* Information leak flaws were found in the Linux kernel Traffic Control\nUnit implementation. A local attacker could use these flaws to cause the\nkernel to leak kernel memory to user-space, possibly leading to the\ndisclosure of sensitive information. (CVE-2010-2942, Moderate)\n\n* A flaw was found in the tcf_act_police_dump() function in the Linux\nkernel network traffic policing implementation. A data structure in\ntcf_act_police_dump() was not initialized properly before being copied to\nuser-space. A local, unprivileged user could use this flaw to cause an\ninformation leak. (CVE-2010-3477, Moderate)\n\n* A missing upper bound integer check was found in the sys_io_submit()\nfunction in the Linux kernel asynchronous I/O implementation. A local,\nunprivileged user could use this flaw to cause an information leak.\n(CVE-2010-3067, Low)\n\nRed Hat would like to thank Tavis Ormandy for reporting CVE-2010-3067.\n\nThis update also fixes the following bugs:\n\n* When two systems using bonding devices in the adaptive load balancing\n(ALB) mode communicated with each other, an endless loop of ARP replies\nstarted between these two systems due to a faulty MAC address update. With\nthis update, the MAC address update no longer creates unneeded ARP replies.\n(BZ#629239)\n\n* When running the Connectathon NFS Testsuite with certain clients and Red\nHat Enterprise Linux 4.8 as the server, nfsvers4, lock, and test2 failed\nthe Connectathon test. (BZ#625535)\n\n* For UDP/UNIX domain sockets, due to insufficient memory barriers in the\nnetwork code, a process sleeping in select() may have missed notifications\nabout new data. In rare cases, this bug may have caused a process to sleep\nforever. (BZ#640117)\n\n* In certain situations, a bug found in either the HTB or TBF network\npacket schedulers in the Linux kernel could have caused a kernel panic when\nusing Broadcom network cards with the bnx2 driver. (BZ#624363)\n\n* Previously, allocating fallback cqr for DASD reserve/release IOCTLs\nfailed because it used the memory pool of the respective device. This\nupdate preallocates sufficient memory for a single reserve/release request.\n(BZ#626828)\n\n* In some situations a bug prevented \"force online\" succeeding for a DASD\ndevice. (BZ#626827)\n\n* Using the \"fsstress\" utility may have caused a kernel panic. (BZ#633968)\n\n* This update introduces additional stack guard patches. (BZ#632515)\n\n* A bug was found in the way the megaraid_sas driver handled physical disks\nand management IOCTLs. All physical disks were exported to the disk layer,\nallowing an oops in megasas_complete_cmd_dpc() when completing the IOCTL\ncommand if a timeout occurred. (BZ#631903)\n\n* Previously, a warning message was returned when a large amount of\nmessages was passed through netconsole and a considerable amount of network\nload was added. With this update, the warning message is no longer\ndisplayed. (BZ#637729)\n\n* Executing a large \"dd\" command (1 to 5GB) on an iSCSI device with the\nqla3xxx driver caused a system crash due to the incorrect storing of a\nprivate data structure. With this update, the size of the stored data\nstructure is checked and the system crashes no longer occur. (BZ#624364)\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2010:0779",
"url": "https://access.redhat.com/errata/RHSA-2010:0779"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "624363",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=624363"
},
{
"category": "external",
"summary": "624364",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=624364"
},
{
"category": "external",
"summary": "624903",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=624903"
},
{
"category": "external",
"summary": "625535",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=625535"
},
{
"category": "external",
"summary": "626827",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=626827"
},
{
"category": "external",
"summary": "626828",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=626828"
},
{
"category": "external",
"summary": "629239",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=629239"
},
{
"category": "external",
"summary": "629441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=629441"
},
{
"category": "external",
"summary": "631903",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=631903"
},
{
"category": "external",
"summary": "632515",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=632515"
},
{
"category": "external",
"summary": "633968",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=633968"
},
{
"category": "external",
"summary": "636386",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=636386"
},
{
"category": "external",
"summary": "637729",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=637729"
},
{
"category": "external",
"summary": "640117",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=640117"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0779.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-11-21T17:36:50+00:00",
"generator": {
"date": "2025-11-21T17:36:50+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2010:0779",
"initial_release_date": "2010-10-19T18:46:00+00:00",
"revision_history": [
{
"date": "2010-10-19T18:46:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2010-10-19T14:47:53+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:36:50+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4",
"product": {
"name": "Red Hat Enterprise Linux AS version 4",
"product_id": "4AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop version 4",
"product": {
"name": "Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4",
"product": {
"name": "Red Hat Enterprise Linux ES version 4",
"product_id": "4ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4",
"product": {
"name": "Red Hat Enterprise Linux WS version 4",
"product_id": "4WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.9-89.31.1.EL.i686",
"product": {
"name": "kernel-debuginfo-0:2.6.9-89.31.1.EL.i686",
"product_id": "kernel-debuginfo-0:2.6.9-89.31.1.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.31.1.EL?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-hugemem-0:2.6.9-89.31.1.EL.i686",
"product": {
"name": "kernel-hugemem-0:2.6.9-89.31.1.EL.i686",
"product_id": "kernel-hugemem-0:2.6.9-89.31.1.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-hugemem@2.6.9-89.31.1.EL?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xenU-devel-0:2.6.9-89.31.1.EL.i686",
"product": {
"name": "kernel-xenU-devel-0:2.6.9-89.31.1.EL.i686",
"product_id": "kernel-xenU-devel-0:2.6.9-89.31.1.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xenU-devel@2.6.9-89.31.1.EL?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-smp-0:2.6.9-89.31.1.EL.i686",
"product": {
"name": "kernel-smp-0:2.6.9-89.31.1.EL.i686",
"product_id": "kernel-smp-0:2.6.9-89.31.1.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-smp@2.6.9-89.31.1.EL?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xenU-0:2.6.9-89.31.1.EL.i686",
"product": {
"name": "kernel-xenU-0:2.6.9-89.31.1.EL.i686",
"product_id": "kernel-xenU-0:2.6.9-89.31.1.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xenU@2.6.9-89.31.1.EL?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-smp-devel-0:2.6.9-89.31.1.EL.i686",
"product": {
"name": "kernel-smp-devel-0:2.6.9-89.31.1.EL.i686",
"product_id": "kernel-smp-devel-0:2.6.9-89.31.1.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-89.31.1.EL?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-hugemem-devel-0:2.6.9-89.31.1.EL.i686",
"product": {
"name": "kernel-hugemem-devel-0:2.6.9-89.31.1.EL.i686",
"product_id": "kernel-hugemem-devel-0:2.6.9-89.31.1.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-hugemem-devel@2.6.9-89.31.1.EL?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.9-89.31.1.EL.i686",
"product": {
"name": "kernel-devel-0:2.6.9-89.31.1.EL.i686",
"product_id": "kernel-devel-0:2.6.9-89.31.1.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.31.1.EL?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.9-89.31.1.EL.i686",
"product": {
"name": "kernel-0:2.6.9-89.31.1.EL.i686",
"product_id": "kernel-0:2.6.9-89.31.1.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-89.31.1.EL?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.9-89.31.1.EL.ia64",
"product": {
"name": "kernel-debuginfo-0:2.6.9-89.31.1.EL.ia64",
"product_id": "kernel-debuginfo-0:2.6.9-89.31.1.EL.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.31.1.EL?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ia64",
"product": {
"name": "kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ia64",
"product_id": "kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-89.31.1.EL?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.9-89.31.1.EL.ia64",
"product": {
"name": "kernel-devel-0:2.6.9-89.31.1.EL.ia64",
"product_id": "kernel-devel-0:2.6.9-89.31.1.EL.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.31.1.EL?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.9-89.31.1.EL.ia64",
"product": {
"name": "kernel-0:2.6.9-89.31.1.EL.ia64",
"product_id": "kernel-0:2.6.9-89.31.1.EL.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-89.31.1.EL?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-largesmp-0:2.6.9-89.31.1.EL.ia64",
"product": {
"name": "kernel-largesmp-0:2.6.9-89.31.1.EL.ia64",
"product_id": "kernel-largesmp-0:2.6.9-89.31.1.EL.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-89.31.1.EL?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.9-89.31.1.EL.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.9-89.31.1.EL.x86_64",
"product_id": "kernel-debuginfo-0:2.6.9-89.31.1.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.31.1.EL?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-largesmp-devel-0:2.6.9-89.31.1.EL.x86_64",
"product": {
"name": "kernel-largesmp-devel-0:2.6.9-89.31.1.EL.x86_64",
"product_id": "kernel-largesmp-devel-0:2.6.9-89.31.1.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-89.31.1.EL?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xenU-devel-0:2.6.9-89.31.1.EL.x86_64",
"product": {
"name": "kernel-xenU-devel-0:2.6.9-89.31.1.EL.x86_64",
"product_id": "kernel-xenU-devel-0:2.6.9-89.31.1.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xenU-devel@2.6.9-89.31.1.EL?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-smp-0:2.6.9-89.31.1.EL.x86_64",
"product": {
"name": "kernel-smp-0:2.6.9-89.31.1.EL.x86_64",
"product_id": "kernel-smp-0:2.6.9-89.31.1.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-smp@2.6.9-89.31.1.EL?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xenU-0:2.6.9-89.31.1.EL.x86_64",
"product": {
"name": "kernel-xenU-0:2.6.9-89.31.1.EL.x86_64",
"product_id": "kernel-xenU-0:2.6.9-89.31.1.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xenU@2.6.9-89.31.1.EL?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-smp-devel-0:2.6.9-89.31.1.EL.x86_64",
"product": {
"name": "kernel-smp-devel-0:2.6.9-89.31.1.EL.x86_64",
"product_id": "kernel-smp-devel-0:2.6.9-89.31.1.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-89.31.1.EL?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.9-89.31.1.EL.x86_64",
"product": {
"name": "kernel-devel-0:2.6.9-89.31.1.EL.x86_64",
"product_id": "kernel-devel-0:2.6.9-89.31.1.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.31.1.EL?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.9-89.31.1.EL.x86_64",
"product": {
"name": "kernel-0:2.6.9-89.31.1.EL.x86_64",
"product_id": "kernel-0:2.6.9-89.31.1.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-89.31.1.EL?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-largesmp-0:2.6.9-89.31.1.EL.x86_64",
"product": {
"name": "kernel-largesmp-0:2.6.9-89.31.1.EL.x86_64",
"product_id": "kernel-largesmp-0:2.6.9-89.31.1.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-89.31.1.EL?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.9-89.31.1.EL.src",
"product": {
"name": "kernel-0:2.6.9-89.31.1.EL.src",
"product_id": "kernel-0:2.6.9-89.31.1.EL.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-89.31.1.EL?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:2.6.9-89.31.1.EL.noarch",
"product": {
"name": "kernel-doc-0:2.6.9-89.31.1.EL.noarch",
"product_id": "kernel-doc-0:2.6.9-89.31.1.EL.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.9-89.31.1.EL?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64",
"product": {
"name": "kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64",
"product_id": "kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.31.1.EL?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ppc64",
"product": {
"name": "kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ppc64",
"product_id": "kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-89.31.1.EL?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.9-89.31.1.EL.ppc64",
"product": {
"name": "kernel-devel-0:2.6.9-89.31.1.EL.ppc64",
"product_id": "kernel-devel-0:2.6.9-89.31.1.EL.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.31.1.EL?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.9-89.31.1.EL.ppc64",
"product": {
"name": "kernel-0:2.6.9-89.31.1.EL.ppc64",
"product_id": "kernel-0:2.6.9-89.31.1.EL.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-89.31.1.EL?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-largesmp-0:2.6.9-89.31.1.EL.ppc64",
"product": {
"name": "kernel-largesmp-0:2.6.9-89.31.1.EL.ppc64",
"product_id": "kernel-largesmp-0:2.6.9-89.31.1.EL.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-89.31.1.EL?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64iseries",
"product": {
"name": "kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64iseries",
"product_id": "kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64iseries",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.31.1.EL?arch=ppc64iseries"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.9-89.31.1.EL.ppc64iseries",
"product": {
"name": "kernel-devel-0:2.6.9-89.31.1.EL.ppc64iseries",
"product_id": "kernel-devel-0:2.6.9-89.31.1.EL.ppc64iseries",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.31.1.EL?arch=ppc64iseries"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.9-89.31.1.EL.ppc64iseries",
"product": {
"name": "kernel-0:2.6.9-89.31.1.EL.ppc64iseries",
"product_id": "kernel-0:2.6.9-89.31.1.EL.ppc64iseries",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-89.31.1.EL?arch=ppc64iseries"
}
}
}
],
"category": "architecture",
"name": "ppc64iseries"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.9-89.31.1.EL.s390x",
"product": {
"name": "kernel-debuginfo-0:2.6.9-89.31.1.EL.s390x",
"product_id": "kernel-debuginfo-0:2.6.9-89.31.1.EL.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.31.1.EL?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.9-89.31.1.EL.s390x",
"product": {
"name": "kernel-devel-0:2.6.9-89.31.1.EL.s390x",
"product_id": "kernel-devel-0:2.6.9-89.31.1.EL.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.31.1.EL?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.9-89.31.1.EL.s390x",
"product": {
"name": "kernel-0:2.6.9-89.31.1.EL.s390x",
"product_id": "kernel-0:2.6.9-89.31.1.EL.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-89.31.1.EL?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.9-89.31.1.EL.s390",
"product": {
"name": "kernel-debuginfo-0:2.6.9-89.31.1.EL.s390",
"product_id": "kernel-debuginfo-0:2.6.9-89.31.1.EL.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.31.1.EL?arch=s390"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.9-89.31.1.EL.s390",
"product": {
"name": "kernel-devel-0:2.6.9-89.31.1.EL.s390",
"product_id": "kernel-devel-0:2.6.9-89.31.1.EL.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.31.1.EL?arch=s390"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.9-89.31.1.EL.s390",
"product": {
"name": "kernel-0:2.6.9-89.31.1.EL.s390",
"product_id": "kernel-0:2.6.9-89.31.1.EL.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-89.31.1.EL?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.31.1.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-0:2.6.9-89.31.1.EL.i686"
},
"product_reference": "kernel-0:2.6.9-89.31.1.EL.i686",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.31.1.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-0:2.6.9-89.31.1.EL.ia64"
},
"product_reference": "kernel-0:2.6.9-89.31.1.EL.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.31.1.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-0:2.6.9-89.31.1.EL.ppc64"
},
"product_reference": "kernel-0:2.6.9-89.31.1.EL.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.31.1.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-0:2.6.9-89.31.1.EL.ppc64iseries"
},
"product_reference": "kernel-0:2.6.9-89.31.1.EL.ppc64iseries",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.31.1.EL.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-0:2.6.9-89.31.1.EL.s390"
},
"product_reference": "kernel-0:2.6.9-89.31.1.EL.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.31.1.EL.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-0:2.6.9-89.31.1.EL.s390x"
},
"product_reference": "kernel-0:2.6.9-89.31.1.EL.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.31.1.EL.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-0:2.6.9-89.31.1.EL.src"
},
"product_reference": "kernel-0:2.6.9-89.31.1.EL.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.31.1.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-0:2.6.9-89.31.1.EL.x86_64"
},
"product_reference": "kernel-0:2.6.9-89.31.1.EL.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.31.1.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.31.1.EL.i686",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.31.1.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.31.1.EL.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64iseries"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64iseries",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.31.1.EL.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.31.1.EL.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.31.1.EL.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.31.1.EL.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.31.1.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.31.1.EL.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.31.1.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-devel-0:2.6.9-89.31.1.EL.i686"
},
"product_reference": "kernel-devel-0:2.6.9-89.31.1.EL.i686",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.31.1.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-devel-0:2.6.9-89.31.1.EL.ia64"
},
"product_reference": "kernel-devel-0:2.6.9-89.31.1.EL.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.31.1.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-devel-0:2.6.9-89.31.1.EL.ppc64"
},
"product_reference": "kernel-devel-0:2.6.9-89.31.1.EL.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.31.1.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-devel-0:2.6.9-89.31.1.EL.ppc64iseries"
},
"product_reference": "kernel-devel-0:2.6.9-89.31.1.EL.ppc64iseries",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.31.1.EL.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-devel-0:2.6.9-89.31.1.EL.s390"
},
"product_reference": "kernel-devel-0:2.6.9-89.31.1.EL.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.31.1.EL.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-devel-0:2.6.9-89.31.1.EL.s390x"
},
"product_reference": "kernel-devel-0:2.6.9-89.31.1.EL.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.31.1.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-devel-0:2.6.9-89.31.1.EL.x86_64"
},
"product_reference": "kernel-devel-0:2.6.9-89.31.1.EL.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.9-89.31.1.EL.noarch as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-doc-0:2.6.9-89.31.1.EL.noarch"
},
"product_reference": "kernel-doc-0:2.6.9-89.31.1.EL.noarch",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-hugemem-0:2.6.9-89.31.1.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-hugemem-0:2.6.9-89.31.1.EL.i686"
},
"product_reference": "kernel-hugemem-0:2.6.9-89.31.1.EL.i686",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-hugemem-devel-0:2.6.9-89.31.1.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-hugemem-devel-0:2.6.9-89.31.1.EL.i686"
},
"product_reference": "kernel-hugemem-devel-0:2.6.9-89.31.1.EL.i686",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-89.31.1.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-largesmp-0:2.6.9-89.31.1.EL.ia64"
},
"product_reference": "kernel-largesmp-0:2.6.9-89.31.1.EL.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-89.31.1.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-largesmp-0:2.6.9-89.31.1.EL.ppc64"
},
"product_reference": "kernel-largesmp-0:2.6.9-89.31.1.EL.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-89.31.1.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-largesmp-0:2.6.9-89.31.1.EL.x86_64"
},
"product_reference": "kernel-largesmp-0:2.6.9-89.31.1.EL.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ia64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ppc64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-89.31.1.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.x86_64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-89.31.1.EL.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-0:2.6.9-89.31.1.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-smp-0:2.6.9-89.31.1.EL.i686"
},
"product_reference": "kernel-smp-0:2.6.9-89.31.1.EL.i686",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-0:2.6.9-89.31.1.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-smp-0:2.6.9-89.31.1.EL.x86_64"
},
"product_reference": "kernel-smp-0:2.6.9-89.31.1.EL.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-devel-0:2.6.9-89.31.1.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-smp-devel-0:2.6.9-89.31.1.EL.i686"
},
"product_reference": "kernel-smp-devel-0:2.6.9-89.31.1.EL.i686",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-devel-0:2.6.9-89.31.1.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-smp-devel-0:2.6.9-89.31.1.EL.x86_64"
},
"product_reference": "kernel-smp-devel-0:2.6.9-89.31.1.EL.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-0:2.6.9-89.31.1.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-xenU-0:2.6.9-89.31.1.EL.i686"
},
"product_reference": "kernel-xenU-0:2.6.9-89.31.1.EL.i686",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-0:2.6.9-89.31.1.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-xenU-0:2.6.9-89.31.1.EL.x86_64"
},
"product_reference": "kernel-xenU-0:2.6.9-89.31.1.EL.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-devel-0:2.6.9-89.31.1.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-xenU-devel-0:2.6.9-89.31.1.EL.i686"
},
"product_reference": "kernel-xenU-devel-0:2.6.9-89.31.1.EL.i686",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-devel-0:2.6.9-89.31.1.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-xenU-devel-0:2.6.9-89.31.1.EL.x86_64"
},
"product_reference": "kernel-xenU-devel-0:2.6.9-89.31.1.EL.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.31.1.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-0:2.6.9-89.31.1.EL.i686"
},
"product_reference": "kernel-0:2.6.9-89.31.1.EL.i686",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.31.1.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-0:2.6.9-89.31.1.EL.ia64"
},
"product_reference": "kernel-0:2.6.9-89.31.1.EL.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.31.1.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-0:2.6.9-89.31.1.EL.ppc64"
},
"product_reference": "kernel-0:2.6.9-89.31.1.EL.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.31.1.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-0:2.6.9-89.31.1.EL.ppc64iseries"
},
"product_reference": "kernel-0:2.6.9-89.31.1.EL.ppc64iseries",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.31.1.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-0:2.6.9-89.31.1.EL.s390"
},
"product_reference": "kernel-0:2.6.9-89.31.1.EL.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.31.1.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-0:2.6.9-89.31.1.EL.s390x"
},
"product_reference": "kernel-0:2.6.9-89.31.1.EL.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.31.1.EL.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-0:2.6.9-89.31.1.EL.src"
},
"product_reference": "kernel-0:2.6.9-89.31.1.EL.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.31.1.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-0:2.6.9-89.31.1.EL.x86_64"
},
"product_reference": "kernel-0:2.6.9-89.31.1.EL.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.31.1.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.31.1.EL.i686",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.31.1.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.31.1.EL.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64iseries"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64iseries",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.31.1.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.31.1.EL.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.31.1.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.31.1.EL.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.31.1.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.31.1.EL.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.31.1.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.i686"
},
"product_reference": "kernel-devel-0:2.6.9-89.31.1.EL.i686",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.31.1.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.ia64"
},
"product_reference": "kernel-devel-0:2.6.9-89.31.1.EL.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.31.1.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.ppc64"
},
"product_reference": "kernel-devel-0:2.6.9-89.31.1.EL.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.31.1.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.ppc64iseries"
},
"product_reference": "kernel-devel-0:2.6.9-89.31.1.EL.ppc64iseries",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.31.1.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.s390"
},
"product_reference": "kernel-devel-0:2.6.9-89.31.1.EL.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.31.1.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.s390x"
},
"product_reference": "kernel-devel-0:2.6.9-89.31.1.EL.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.31.1.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.x86_64"
},
"product_reference": "kernel-devel-0:2.6.9-89.31.1.EL.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.9-89.31.1.EL.noarch as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-doc-0:2.6.9-89.31.1.EL.noarch"
},
"product_reference": "kernel-doc-0:2.6.9-89.31.1.EL.noarch",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-hugemem-0:2.6.9-89.31.1.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-hugemem-0:2.6.9-89.31.1.EL.i686"
},
"product_reference": "kernel-hugemem-0:2.6.9-89.31.1.EL.i686",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-hugemem-devel-0:2.6.9-89.31.1.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-hugemem-devel-0:2.6.9-89.31.1.EL.i686"
},
"product_reference": "kernel-hugemem-devel-0:2.6.9-89.31.1.EL.i686",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-89.31.1.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-largesmp-0:2.6.9-89.31.1.EL.ia64"
},
"product_reference": "kernel-largesmp-0:2.6.9-89.31.1.EL.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-89.31.1.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-largesmp-0:2.6.9-89.31.1.EL.ppc64"
},
"product_reference": "kernel-largesmp-0:2.6.9-89.31.1.EL.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-89.31.1.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-largesmp-0:2.6.9-89.31.1.EL.x86_64"
},
"product_reference": "kernel-largesmp-0:2.6.9-89.31.1.EL.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ia64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ppc64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-89.31.1.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.x86_64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-89.31.1.EL.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-0:2.6.9-89.31.1.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-smp-0:2.6.9-89.31.1.EL.i686"
},
"product_reference": "kernel-smp-0:2.6.9-89.31.1.EL.i686",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-0:2.6.9-89.31.1.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-smp-0:2.6.9-89.31.1.EL.x86_64"
},
"product_reference": "kernel-smp-0:2.6.9-89.31.1.EL.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-devel-0:2.6.9-89.31.1.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-smp-devel-0:2.6.9-89.31.1.EL.i686"
},
"product_reference": "kernel-smp-devel-0:2.6.9-89.31.1.EL.i686",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-devel-0:2.6.9-89.31.1.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-smp-devel-0:2.6.9-89.31.1.EL.x86_64"
},
"product_reference": "kernel-smp-devel-0:2.6.9-89.31.1.EL.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-0:2.6.9-89.31.1.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-xenU-0:2.6.9-89.31.1.EL.i686"
},
"product_reference": "kernel-xenU-0:2.6.9-89.31.1.EL.i686",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-0:2.6.9-89.31.1.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-xenU-0:2.6.9-89.31.1.EL.x86_64"
},
"product_reference": "kernel-xenU-0:2.6.9-89.31.1.EL.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-devel-0:2.6.9-89.31.1.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-xenU-devel-0:2.6.9-89.31.1.EL.i686"
},
"product_reference": "kernel-xenU-devel-0:2.6.9-89.31.1.EL.i686",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-devel-0:2.6.9-89.31.1.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-xenU-devel-0:2.6.9-89.31.1.EL.x86_64"
},
"product_reference": "kernel-xenU-devel-0:2.6.9-89.31.1.EL.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.31.1.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-0:2.6.9-89.31.1.EL.i686"
},
"product_reference": "kernel-0:2.6.9-89.31.1.EL.i686",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.31.1.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-0:2.6.9-89.31.1.EL.ia64"
},
"product_reference": "kernel-0:2.6.9-89.31.1.EL.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.31.1.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-0:2.6.9-89.31.1.EL.ppc64"
},
"product_reference": "kernel-0:2.6.9-89.31.1.EL.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.31.1.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-0:2.6.9-89.31.1.EL.ppc64iseries"
},
"product_reference": "kernel-0:2.6.9-89.31.1.EL.ppc64iseries",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.31.1.EL.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-0:2.6.9-89.31.1.EL.s390"
},
"product_reference": "kernel-0:2.6.9-89.31.1.EL.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.31.1.EL.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-0:2.6.9-89.31.1.EL.s390x"
},
"product_reference": "kernel-0:2.6.9-89.31.1.EL.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.31.1.EL.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-0:2.6.9-89.31.1.EL.src"
},
"product_reference": "kernel-0:2.6.9-89.31.1.EL.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.31.1.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-0:2.6.9-89.31.1.EL.x86_64"
},
"product_reference": "kernel-0:2.6.9-89.31.1.EL.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.31.1.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.31.1.EL.i686",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.31.1.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.31.1.EL.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64iseries"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64iseries",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.31.1.EL.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.31.1.EL.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.31.1.EL.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.31.1.EL.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.31.1.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.31.1.EL.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.31.1.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-devel-0:2.6.9-89.31.1.EL.i686"
},
"product_reference": "kernel-devel-0:2.6.9-89.31.1.EL.i686",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.31.1.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-devel-0:2.6.9-89.31.1.EL.ia64"
},
"product_reference": "kernel-devel-0:2.6.9-89.31.1.EL.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.31.1.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-devel-0:2.6.9-89.31.1.EL.ppc64"
},
"product_reference": "kernel-devel-0:2.6.9-89.31.1.EL.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.31.1.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-devel-0:2.6.9-89.31.1.EL.ppc64iseries"
},
"product_reference": "kernel-devel-0:2.6.9-89.31.1.EL.ppc64iseries",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.31.1.EL.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-devel-0:2.6.9-89.31.1.EL.s390"
},
"product_reference": "kernel-devel-0:2.6.9-89.31.1.EL.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.31.1.EL.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-devel-0:2.6.9-89.31.1.EL.s390x"
},
"product_reference": "kernel-devel-0:2.6.9-89.31.1.EL.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.31.1.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-devel-0:2.6.9-89.31.1.EL.x86_64"
},
"product_reference": "kernel-devel-0:2.6.9-89.31.1.EL.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.9-89.31.1.EL.noarch as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-doc-0:2.6.9-89.31.1.EL.noarch"
},
"product_reference": "kernel-doc-0:2.6.9-89.31.1.EL.noarch",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-hugemem-0:2.6.9-89.31.1.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-hugemem-0:2.6.9-89.31.1.EL.i686"
},
"product_reference": "kernel-hugemem-0:2.6.9-89.31.1.EL.i686",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-hugemem-devel-0:2.6.9-89.31.1.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-hugemem-devel-0:2.6.9-89.31.1.EL.i686"
},
"product_reference": "kernel-hugemem-devel-0:2.6.9-89.31.1.EL.i686",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-89.31.1.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-largesmp-0:2.6.9-89.31.1.EL.ia64"
},
"product_reference": "kernel-largesmp-0:2.6.9-89.31.1.EL.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-89.31.1.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-largesmp-0:2.6.9-89.31.1.EL.ppc64"
},
"product_reference": "kernel-largesmp-0:2.6.9-89.31.1.EL.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-89.31.1.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-largesmp-0:2.6.9-89.31.1.EL.x86_64"
},
"product_reference": "kernel-largesmp-0:2.6.9-89.31.1.EL.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ia64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ppc64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-89.31.1.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.x86_64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-89.31.1.EL.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-0:2.6.9-89.31.1.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-smp-0:2.6.9-89.31.1.EL.i686"
},
"product_reference": "kernel-smp-0:2.6.9-89.31.1.EL.i686",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-0:2.6.9-89.31.1.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-smp-0:2.6.9-89.31.1.EL.x86_64"
},
"product_reference": "kernel-smp-0:2.6.9-89.31.1.EL.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-devel-0:2.6.9-89.31.1.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-smp-devel-0:2.6.9-89.31.1.EL.i686"
},
"product_reference": "kernel-smp-devel-0:2.6.9-89.31.1.EL.i686",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-devel-0:2.6.9-89.31.1.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-smp-devel-0:2.6.9-89.31.1.EL.x86_64"
},
"product_reference": "kernel-smp-devel-0:2.6.9-89.31.1.EL.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-0:2.6.9-89.31.1.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-xenU-0:2.6.9-89.31.1.EL.i686"
},
"product_reference": "kernel-xenU-0:2.6.9-89.31.1.EL.i686",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-0:2.6.9-89.31.1.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-xenU-0:2.6.9-89.31.1.EL.x86_64"
},
"product_reference": "kernel-xenU-0:2.6.9-89.31.1.EL.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-devel-0:2.6.9-89.31.1.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-xenU-devel-0:2.6.9-89.31.1.EL.i686"
},
"product_reference": "kernel-xenU-devel-0:2.6.9-89.31.1.EL.i686",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-devel-0:2.6.9-89.31.1.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-xenU-devel-0:2.6.9-89.31.1.EL.x86_64"
},
"product_reference": "kernel-xenU-devel-0:2.6.9-89.31.1.EL.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.31.1.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-0:2.6.9-89.31.1.EL.i686"
},
"product_reference": "kernel-0:2.6.9-89.31.1.EL.i686",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.31.1.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-0:2.6.9-89.31.1.EL.ia64"
},
"product_reference": "kernel-0:2.6.9-89.31.1.EL.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.31.1.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-0:2.6.9-89.31.1.EL.ppc64"
},
"product_reference": "kernel-0:2.6.9-89.31.1.EL.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.31.1.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-0:2.6.9-89.31.1.EL.ppc64iseries"
},
"product_reference": "kernel-0:2.6.9-89.31.1.EL.ppc64iseries",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.31.1.EL.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-0:2.6.9-89.31.1.EL.s390"
},
"product_reference": "kernel-0:2.6.9-89.31.1.EL.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.31.1.EL.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-0:2.6.9-89.31.1.EL.s390x"
},
"product_reference": "kernel-0:2.6.9-89.31.1.EL.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.31.1.EL.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-0:2.6.9-89.31.1.EL.src"
},
"product_reference": "kernel-0:2.6.9-89.31.1.EL.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-89.31.1.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-0:2.6.9-89.31.1.EL.x86_64"
},
"product_reference": "kernel-0:2.6.9-89.31.1.EL.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.31.1.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.31.1.EL.i686",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.31.1.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.31.1.EL.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64iseries"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64iseries",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.31.1.EL.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.31.1.EL.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.31.1.EL.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.31.1.EL.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-89.31.1.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-89.31.1.EL.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.31.1.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-devel-0:2.6.9-89.31.1.EL.i686"
},
"product_reference": "kernel-devel-0:2.6.9-89.31.1.EL.i686",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.31.1.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-devel-0:2.6.9-89.31.1.EL.ia64"
},
"product_reference": "kernel-devel-0:2.6.9-89.31.1.EL.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.31.1.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-devel-0:2.6.9-89.31.1.EL.ppc64"
},
"product_reference": "kernel-devel-0:2.6.9-89.31.1.EL.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.31.1.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-devel-0:2.6.9-89.31.1.EL.ppc64iseries"
},
"product_reference": "kernel-devel-0:2.6.9-89.31.1.EL.ppc64iseries",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.31.1.EL.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-devel-0:2.6.9-89.31.1.EL.s390"
},
"product_reference": "kernel-devel-0:2.6.9-89.31.1.EL.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.31.1.EL.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-devel-0:2.6.9-89.31.1.EL.s390x"
},
"product_reference": "kernel-devel-0:2.6.9-89.31.1.EL.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-89.31.1.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-devel-0:2.6.9-89.31.1.EL.x86_64"
},
"product_reference": "kernel-devel-0:2.6.9-89.31.1.EL.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.9-89.31.1.EL.noarch as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-doc-0:2.6.9-89.31.1.EL.noarch"
},
"product_reference": "kernel-doc-0:2.6.9-89.31.1.EL.noarch",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-hugemem-0:2.6.9-89.31.1.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-hugemem-0:2.6.9-89.31.1.EL.i686"
},
"product_reference": "kernel-hugemem-0:2.6.9-89.31.1.EL.i686",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-hugemem-devel-0:2.6.9-89.31.1.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-hugemem-devel-0:2.6.9-89.31.1.EL.i686"
},
"product_reference": "kernel-hugemem-devel-0:2.6.9-89.31.1.EL.i686",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-89.31.1.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-largesmp-0:2.6.9-89.31.1.EL.ia64"
},
"product_reference": "kernel-largesmp-0:2.6.9-89.31.1.EL.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-89.31.1.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-largesmp-0:2.6.9-89.31.1.EL.ppc64"
},
"product_reference": "kernel-largesmp-0:2.6.9-89.31.1.EL.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-89.31.1.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-largesmp-0:2.6.9-89.31.1.EL.x86_64"
},
"product_reference": "kernel-largesmp-0:2.6.9-89.31.1.EL.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ia64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ppc64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-89.31.1.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.x86_64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-89.31.1.EL.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-0:2.6.9-89.31.1.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-smp-0:2.6.9-89.31.1.EL.i686"
},
"product_reference": "kernel-smp-0:2.6.9-89.31.1.EL.i686",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-0:2.6.9-89.31.1.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-smp-0:2.6.9-89.31.1.EL.x86_64"
},
"product_reference": "kernel-smp-0:2.6.9-89.31.1.EL.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-devel-0:2.6.9-89.31.1.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-smp-devel-0:2.6.9-89.31.1.EL.i686"
},
"product_reference": "kernel-smp-devel-0:2.6.9-89.31.1.EL.i686",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-devel-0:2.6.9-89.31.1.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-smp-devel-0:2.6.9-89.31.1.EL.x86_64"
},
"product_reference": "kernel-smp-devel-0:2.6.9-89.31.1.EL.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-0:2.6.9-89.31.1.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-xenU-0:2.6.9-89.31.1.EL.i686"
},
"product_reference": "kernel-xenU-0:2.6.9-89.31.1.EL.i686",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-0:2.6.9-89.31.1.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-xenU-0:2.6.9-89.31.1.EL.x86_64"
},
"product_reference": "kernel-xenU-0:2.6.9-89.31.1.EL.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-devel-0:2.6.9-89.31.1.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-xenU-devel-0:2.6.9-89.31.1.EL.i686"
},
"product_reference": "kernel-xenU-devel-0:2.6.9-89.31.1.EL.i686",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-devel-0:2.6.9-89.31.1.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-xenU-devel-0:2.6.9-89.31.1.EL.x86_64"
},
"product_reference": "kernel-xenU-devel-0:2.6.9-89.31.1.EL.x86_64",
"relates_to_product_reference": "4WS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2010-2942",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2010-08-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "624903"
}
],
"notes": [
{
"category": "description",
"text": "The actions implementation in the network queueing functionality in the Linux kernel before 2.6.36-rc2 does not properly initialize certain structure members when performing dump operations, which allows local users to obtain potentially sensitive information from kernel memory via vectors related to (1) the tcf_gact_dump function in net/sched/act_gact.c, (2) the tcf_mirred_dump function in net/sched/act_mirred.c, (3) the tcf_nat_dump function in net/sched/act_nat.c, (4) the tcf_simp_dump function in net/sched/act_simple.c, and (5) the tcf_skbedit_dump function in net/sched/act_skbedit.c.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net sched: fix some kernel memory leaks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the version of Linux kernel as shipped with Red Hat\nEnterprise Linux 3 as it did not include upstream commit be84c7f6 (history repository) that introduced the problem. A future kernel update in Red Hat Enterprise Linux 4, 5 and Red Hat Enterprise MRG will address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:kernel-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-0:2.6.9-89.31.1.EL.ia64",
"4AS:kernel-0:2.6.9-89.31.1.EL.ppc64",
"4AS:kernel-0:2.6.9-89.31.1.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-89.31.1.EL.s390",
"4AS:kernel-0:2.6.9-89.31.1.EL.s390x",
"4AS:kernel-0:2.6.9-89.31.1.EL.src",
"4AS:kernel-0:2.6.9-89.31.1.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-devel-0:2.6.9-89.31.1.EL.ia64",
"4AS:kernel-devel-0:2.6.9-89.31.1.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-89.31.1.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-89.31.1.EL.s390",
"4AS:kernel-devel-0:2.6.9-89.31.1.EL.s390x",
"4AS:kernel-devel-0:2.6.9-89.31.1.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-89.31.1.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-89.31.1.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-89.31.1.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-89.31.1.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-smp-0:2.6.9-89.31.1.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-89.31.1.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-xenU-0:2.6.9-89.31.1.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-0:2.6.9-89.31.1.EL.ia64",
"4Desktop:kernel-0:2.6.9-89.31.1.EL.ppc64",
"4Desktop:kernel-0:2.6.9-89.31.1.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-89.31.1.EL.s390",
"4Desktop:kernel-0:2.6.9-89.31.1.EL.s390x",
"4Desktop:kernel-0:2.6.9-89.31.1.EL.src",
"4Desktop:kernel-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-89.31.1.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-89.31.1.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-89.31.1.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-0:2.6.9-89.31.1.EL.ia64",
"4ES:kernel-0:2.6.9-89.31.1.EL.ppc64",
"4ES:kernel-0:2.6.9-89.31.1.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-89.31.1.EL.s390",
"4ES:kernel-0:2.6.9-89.31.1.EL.s390x",
"4ES:kernel-0:2.6.9-89.31.1.EL.src",
"4ES:kernel-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-devel-0:2.6.9-89.31.1.EL.ia64",
"4ES:kernel-devel-0:2.6.9-89.31.1.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-89.31.1.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-89.31.1.EL.s390",
"4ES:kernel-devel-0:2.6.9-89.31.1.EL.s390x",
"4ES:kernel-devel-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-89.31.1.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-89.31.1.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-89.31.1.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-smp-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-xenU-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-0:2.6.9-89.31.1.EL.ia64",
"4WS:kernel-0:2.6.9-89.31.1.EL.ppc64",
"4WS:kernel-0:2.6.9-89.31.1.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-89.31.1.EL.s390",
"4WS:kernel-0:2.6.9-89.31.1.EL.s390x",
"4WS:kernel-0:2.6.9-89.31.1.EL.src",
"4WS:kernel-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-devel-0:2.6.9-89.31.1.EL.ia64",
"4WS:kernel-devel-0:2.6.9-89.31.1.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-89.31.1.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-89.31.1.EL.s390",
"4WS:kernel-devel-0:2.6.9-89.31.1.EL.s390x",
"4WS:kernel-devel-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-89.31.1.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-89.31.1.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-89.31.1.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-smp-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-xenU-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-89.31.1.EL.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2010-2942"
},
{
"category": "external",
"summary": "RHBZ#624903",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=624903"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2010-2942",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2942"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-2942",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2942"
}
],
"release_date": "2010-08-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-10-19T18:46:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"4AS:kernel-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-0:2.6.9-89.31.1.EL.ia64",
"4AS:kernel-0:2.6.9-89.31.1.EL.ppc64",
"4AS:kernel-0:2.6.9-89.31.1.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-89.31.1.EL.s390",
"4AS:kernel-0:2.6.9-89.31.1.EL.s390x",
"4AS:kernel-0:2.6.9-89.31.1.EL.src",
"4AS:kernel-0:2.6.9-89.31.1.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-devel-0:2.6.9-89.31.1.EL.ia64",
"4AS:kernel-devel-0:2.6.9-89.31.1.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-89.31.1.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-89.31.1.EL.s390",
"4AS:kernel-devel-0:2.6.9-89.31.1.EL.s390x",
"4AS:kernel-devel-0:2.6.9-89.31.1.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-89.31.1.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-89.31.1.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-89.31.1.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-89.31.1.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-smp-0:2.6.9-89.31.1.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-89.31.1.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-xenU-0:2.6.9-89.31.1.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-0:2.6.9-89.31.1.EL.ia64",
"4Desktop:kernel-0:2.6.9-89.31.1.EL.ppc64",
"4Desktop:kernel-0:2.6.9-89.31.1.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-89.31.1.EL.s390",
"4Desktop:kernel-0:2.6.9-89.31.1.EL.s390x",
"4Desktop:kernel-0:2.6.9-89.31.1.EL.src",
"4Desktop:kernel-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-89.31.1.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-89.31.1.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-89.31.1.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-0:2.6.9-89.31.1.EL.ia64",
"4ES:kernel-0:2.6.9-89.31.1.EL.ppc64",
"4ES:kernel-0:2.6.9-89.31.1.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-89.31.1.EL.s390",
"4ES:kernel-0:2.6.9-89.31.1.EL.s390x",
"4ES:kernel-0:2.6.9-89.31.1.EL.src",
"4ES:kernel-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-devel-0:2.6.9-89.31.1.EL.ia64",
"4ES:kernel-devel-0:2.6.9-89.31.1.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-89.31.1.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-89.31.1.EL.s390",
"4ES:kernel-devel-0:2.6.9-89.31.1.EL.s390x",
"4ES:kernel-devel-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-89.31.1.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-89.31.1.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-89.31.1.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-smp-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-xenU-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-0:2.6.9-89.31.1.EL.ia64",
"4WS:kernel-0:2.6.9-89.31.1.EL.ppc64",
"4WS:kernel-0:2.6.9-89.31.1.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-89.31.1.EL.s390",
"4WS:kernel-0:2.6.9-89.31.1.EL.s390x",
"4WS:kernel-0:2.6.9-89.31.1.EL.src",
"4WS:kernel-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-devel-0:2.6.9-89.31.1.EL.ia64",
"4WS:kernel-devel-0:2.6.9-89.31.1.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-89.31.1.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-89.31.1.EL.s390",
"4WS:kernel-devel-0:2.6.9-89.31.1.EL.s390x",
"4WS:kernel-devel-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-89.31.1.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-89.31.1.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-89.31.1.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-smp-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-xenU-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-89.31.1.EL.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0779"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS:kernel-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-0:2.6.9-89.31.1.EL.ia64",
"4AS:kernel-0:2.6.9-89.31.1.EL.ppc64",
"4AS:kernel-0:2.6.9-89.31.1.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-89.31.1.EL.s390",
"4AS:kernel-0:2.6.9-89.31.1.EL.s390x",
"4AS:kernel-0:2.6.9-89.31.1.EL.src",
"4AS:kernel-0:2.6.9-89.31.1.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-devel-0:2.6.9-89.31.1.EL.ia64",
"4AS:kernel-devel-0:2.6.9-89.31.1.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-89.31.1.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-89.31.1.EL.s390",
"4AS:kernel-devel-0:2.6.9-89.31.1.EL.s390x",
"4AS:kernel-devel-0:2.6.9-89.31.1.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-89.31.1.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-89.31.1.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-89.31.1.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-89.31.1.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-smp-0:2.6.9-89.31.1.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-89.31.1.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-xenU-0:2.6.9-89.31.1.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-0:2.6.9-89.31.1.EL.ia64",
"4Desktop:kernel-0:2.6.9-89.31.1.EL.ppc64",
"4Desktop:kernel-0:2.6.9-89.31.1.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-89.31.1.EL.s390",
"4Desktop:kernel-0:2.6.9-89.31.1.EL.s390x",
"4Desktop:kernel-0:2.6.9-89.31.1.EL.src",
"4Desktop:kernel-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-89.31.1.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-89.31.1.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-89.31.1.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-0:2.6.9-89.31.1.EL.ia64",
"4ES:kernel-0:2.6.9-89.31.1.EL.ppc64",
"4ES:kernel-0:2.6.9-89.31.1.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-89.31.1.EL.s390",
"4ES:kernel-0:2.6.9-89.31.1.EL.s390x",
"4ES:kernel-0:2.6.9-89.31.1.EL.src",
"4ES:kernel-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-devel-0:2.6.9-89.31.1.EL.ia64",
"4ES:kernel-devel-0:2.6.9-89.31.1.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-89.31.1.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-89.31.1.EL.s390",
"4ES:kernel-devel-0:2.6.9-89.31.1.EL.s390x",
"4ES:kernel-devel-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-89.31.1.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-89.31.1.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-89.31.1.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-smp-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-xenU-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-0:2.6.9-89.31.1.EL.ia64",
"4WS:kernel-0:2.6.9-89.31.1.EL.ppc64",
"4WS:kernel-0:2.6.9-89.31.1.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-89.31.1.EL.s390",
"4WS:kernel-0:2.6.9-89.31.1.EL.s390x",
"4WS:kernel-0:2.6.9-89.31.1.EL.src",
"4WS:kernel-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-devel-0:2.6.9-89.31.1.EL.ia64",
"4WS:kernel-devel-0:2.6.9-89.31.1.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-89.31.1.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-89.31.1.EL.s390",
"4WS:kernel-devel-0:2.6.9-89.31.1.EL.s390x",
"4WS:kernel-devel-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-89.31.1.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-89.31.1.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-89.31.1.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-smp-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-xenU-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-89.31.1.EL.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net sched: fix some kernel memory leaks"
},
{
"acknowledgments": [
{
"names": [
"Tavis Ormandy"
]
}
],
"cve": "CVE-2010-3067",
"discovery_date": "2010-09-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "629441"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in the do_io_submit function in fs/aio.c in the Linux kernel before 2.6.36-rc4-next-20100915 allows local users to cause a denial of service or possibly have unspecified other impact via crafted use of the io_submit system call.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: do_io_submit() infoleak",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:kernel-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-0:2.6.9-89.31.1.EL.ia64",
"4AS:kernel-0:2.6.9-89.31.1.EL.ppc64",
"4AS:kernel-0:2.6.9-89.31.1.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-89.31.1.EL.s390",
"4AS:kernel-0:2.6.9-89.31.1.EL.s390x",
"4AS:kernel-0:2.6.9-89.31.1.EL.src",
"4AS:kernel-0:2.6.9-89.31.1.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-devel-0:2.6.9-89.31.1.EL.ia64",
"4AS:kernel-devel-0:2.6.9-89.31.1.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-89.31.1.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-89.31.1.EL.s390",
"4AS:kernel-devel-0:2.6.9-89.31.1.EL.s390x",
"4AS:kernel-devel-0:2.6.9-89.31.1.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-89.31.1.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-89.31.1.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-89.31.1.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-89.31.1.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-smp-0:2.6.9-89.31.1.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-89.31.1.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-xenU-0:2.6.9-89.31.1.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-0:2.6.9-89.31.1.EL.ia64",
"4Desktop:kernel-0:2.6.9-89.31.1.EL.ppc64",
"4Desktop:kernel-0:2.6.9-89.31.1.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-89.31.1.EL.s390",
"4Desktop:kernel-0:2.6.9-89.31.1.EL.s390x",
"4Desktop:kernel-0:2.6.9-89.31.1.EL.src",
"4Desktop:kernel-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-89.31.1.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-89.31.1.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-89.31.1.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-0:2.6.9-89.31.1.EL.ia64",
"4ES:kernel-0:2.6.9-89.31.1.EL.ppc64",
"4ES:kernel-0:2.6.9-89.31.1.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-89.31.1.EL.s390",
"4ES:kernel-0:2.6.9-89.31.1.EL.s390x",
"4ES:kernel-0:2.6.9-89.31.1.EL.src",
"4ES:kernel-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-devel-0:2.6.9-89.31.1.EL.ia64",
"4ES:kernel-devel-0:2.6.9-89.31.1.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-89.31.1.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-89.31.1.EL.s390",
"4ES:kernel-devel-0:2.6.9-89.31.1.EL.s390x",
"4ES:kernel-devel-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-89.31.1.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-89.31.1.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-89.31.1.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-smp-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-xenU-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-0:2.6.9-89.31.1.EL.ia64",
"4WS:kernel-0:2.6.9-89.31.1.EL.ppc64",
"4WS:kernel-0:2.6.9-89.31.1.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-89.31.1.EL.s390",
"4WS:kernel-0:2.6.9-89.31.1.EL.s390x",
"4WS:kernel-0:2.6.9-89.31.1.EL.src",
"4WS:kernel-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-devel-0:2.6.9-89.31.1.EL.ia64",
"4WS:kernel-devel-0:2.6.9-89.31.1.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-89.31.1.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-89.31.1.EL.s390",
"4WS:kernel-devel-0:2.6.9-89.31.1.EL.s390x",
"4WS:kernel-devel-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-89.31.1.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-89.31.1.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-89.31.1.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-smp-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-xenU-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-89.31.1.EL.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2010-3067"
},
{
"category": "external",
"summary": "RHBZ#629441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=629441"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2010-3067",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3067"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3067",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3067"
}
],
"release_date": "2010-09-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-10-19T18:46:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"4AS:kernel-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-0:2.6.9-89.31.1.EL.ia64",
"4AS:kernel-0:2.6.9-89.31.1.EL.ppc64",
"4AS:kernel-0:2.6.9-89.31.1.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-89.31.1.EL.s390",
"4AS:kernel-0:2.6.9-89.31.1.EL.s390x",
"4AS:kernel-0:2.6.9-89.31.1.EL.src",
"4AS:kernel-0:2.6.9-89.31.1.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-devel-0:2.6.9-89.31.1.EL.ia64",
"4AS:kernel-devel-0:2.6.9-89.31.1.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-89.31.1.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-89.31.1.EL.s390",
"4AS:kernel-devel-0:2.6.9-89.31.1.EL.s390x",
"4AS:kernel-devel-0:2.6.9-89.31.1.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-89.31.1.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-89.31.1.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-89.31.1.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-89.31.1.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-smp-0:2.6.9-89.31.1.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-89.31.1.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-xenU-0:2.6.9-89.31.1.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-0:2.6.9-89.31.1.EL.ia64",
"4Desktop:kernel-0:2.6.9-89.31.1.EL.ppc64",
"4Desktop:kernel-0:2.6.9-89.31.1.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-89.31.1.EL.s390",
"4Desktop:kernel-0:2.6.9-89.31.1.EL.s390x",
"4Desktop:kernel-0:2.6.9-89.31.1.EL.src",
"4Desktop:kernel-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-89.31.1.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-89.31.1.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-89.31.1.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-0:2.6.9-89.31.1.EL.ia64",
"4ES:kernel-0:2.6.9-89.31.1.EL.ppc64",
"4ES:kernel-0:2.6.9-89.31.1.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-89.31.1.EL.s390",
"4ES:kernel-0:2.6.9-89.31.1.EL.s390x",
"4ES:kernel-0:2.6.9-89.31.1.EL.src",
"4ES:kernel-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-devel-0:2.6.9-89.31.1.EL.ia64",
"4ES:kernel-devel-0:2.6.9-89.31.1.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-89.31.1.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-89.31.1.EL.s390",
"4ES:kernel-devel-0:2.6.9-89.31.1.EL.s390x",
"4ES:kernel-devel-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-89.31.1.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-89.31.1.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-89.31.1.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-smp-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-xenU-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-0:2.6.9-89.31.1.EL.ia64",
"4WS:kernel-0:2.6.9-89.31.1.EL.ppc64",
"4WS:kernel-0:2.6.9-89.31.1.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-89.31.1.EL.s390",
"4WS:kernel-0:2.6.9-89.31.1.EL.s390x",
"4WS:kernel-0:2.6.9-89.31.1.EL.src",
"4WS:kernel-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-devel-0:2.6.9-89.31.1.EL.ia64",
"4WS:kernel-devel-0:2.6.9-89.31.1.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-89.31.1.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-89.31.1.EL.s390",
"4WS:kernel-devel-0:2.6.9-89.31.1.EL.s390x",
"4WS:kernel-devel-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-89.31.1.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-89.31.1.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-89.31.1.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-smp-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-xenU-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-89.31.1.EL.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0779"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS:kernel-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-0:2.6.9-89.31.1.EL.ia64",
"4AS:kernel-0:2.6.9-89.31.1.EL.ppc64",
"4AS:kernel-0:2.6.9-89.31.1.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-89.31.1.EL.s390",
"4AS:kernel-0:2.6.9-89.31.1.EL.s390x",
"4AS:kernel-0:2.6.9-89.31.1.EL.src",
"4AS:kernel-0:2.6.9-89.31.1.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-devel-0:2.6.9-89.31.1.EL.ia64",
"4AS:kernel-devel-0:2.6.9-89.31.1.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-89.31.1.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-89.31.1.EL.s390",
"4AS:kernel-devel-0:2.6.9-89.31.1.EL.s390x",
"4AS:kernel-devel-0:2.6.9-89.31.1.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-89.31.1.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-89.31.1.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-89.31.1.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-89.31.1.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-smp-0:2.6.9-89.31.1.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-89.31.1.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-xenU-0:2.6.9-89.31.1.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-0:2.6.9-89.31.1.EL.ia64",
"4Desktop:kernel-0:2.6.9-89.31.1.EL.ppc64",
"4Desktop:kernel-0:2.6.9-89.31.1.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-89.31.1.EL.s390",
"4Desktop:kernel-0:2.6.9-89.31.1.EL.s390x",
"4Desktop:kernel-0:2.6.9-89.31.1.EL.src",
"4Desktop:kernel-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-89.31.1.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-89.31.1.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-89.31.1.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-0:2.6.9-89.31.1.EL.ia64",
"4ES:kernel-0:2.6.9-89.31.1.EL.ppc64",
"4ES:kernel-0:2.6.9-89.31.1.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-89.31.1.EL.s390",
"4ES:kernel-0:2.6.9-89.31.1.EL.s390x",
"4ES:kernel-0:2.6.9-89.31.1.EL.src",
"4ES:kernel-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-devel-0:2.6.9-89.31.1.EL.ia64",
"4ES:kernel-devel-0:2.6.9-89.31.1.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-89.31.1.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-89.31.1.EL.s390",
"4ES:kernel-devel-0:2.6.9-89.31.1.EL.s390x",
"4ES:kernel-devel-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-89.31.1.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-89.31.1.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-89.31.1.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-smp-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-xenU-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-0:2.6.9-89.31.1.EL.ia64",
"4WS:kernel-0:2.6.9-89.31.1.EL.ppc64",
"4WS:kernel-0:2.6.9-89.31.1.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-89.31.1.EL.s390",
"4WS:kernel-0:2.6.9-89.31.1.EL.s390x",
"4WS:kernel-0:2.6.9-89.31.1.EL.src",
"4WS:kernel-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-devel-0:2.6.9-89.31.1.EL.ia64",
"4WS:kernel-devel-0:2.6.9-89.31.1.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-89.31.1.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-89.31.1.EL.s390",
"4WS:kernel-devel-0:2.6.9-89.31.1.EL.s390x",
"4WS:kernel-devel-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-89.31.1.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-89.31.1.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-89.31.1.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-smp-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-xenU-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-89.31.1.EL.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: do_io_submit() infoleak"
},
{
"cve": "CVE-2010-3477",
"discovery_date": "2010-09-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "636386"
}
],
"notes": [
{
"category": "description",
"text": "The tcf_act_police_dump function in net/sched/act_police.c in the actions implementation in the network queueing functionality in the Linux kernel before 2.6.36-rc4 does not properly initialize certain structure members, which allows local users to obtain potentially sensitive information from kernel memory via vectors involving a dump operation. NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-2942.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net/sched/act_police.c infoleak",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:kernel-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-0:2.6.9-89.31.1.EL.ia64",
"4AS:kernel-0:2.6.9-89.31.1.EL.ppc64",
"4AS:kernel-0:2.6.9-89.31.1.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-89.31.1.EL.s390",
"4AS:kernel-0:2.6.9-89.31.1.EL.s390x",
"4AS:kernel-0:2.6.9-89.31.1.EL.src",
"4AS:kernel-0:2.6.9-89.31.1.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-devel-0:2.6.9-89.31.1.EL.ia64",
"4AS:kernel-devel-0:2.6.9-89.31.1.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-89.31.1.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-89.31.1.EL.s390",
"4AS:kernel-devel-0:2.6.9-89.31.1.EL.s390x",
"4AS:kernel-devel-0:2.6.9-89.31.1.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-89.31.1.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-89.31.1.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-89.31.1.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-89.31.1.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-smp-0:2.6.9-89.31.1.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-89.31.1.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-xenU-0:2.6.9-89.31.1.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-0:2.6.9-89.31.1.EL.ia64",
"4Desktop:kernel-0:2.6.9-89.31.1.EL.ppc64",
"4Desktop:kernel-0:2.6.9-89.31.1.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-89.31.1.EL.s390",
"4Desktop:kernel-0:2.6.9-89.31.1.EL.s390x",
"4Desktop:kernel-0:2.6.9-89.31.1.EL.src",
"4Desktop:kernel-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-89.31.1.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-89.31.1.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-89.31.1.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-0:2.6.9-89.31.1.EL.ia64",
"4ES:kernel-0:2.6.9-89.31.1.EL.ppc64",
"4ES:kernel-0:2.6.9-89.31.1.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-89.31.1.EL.s390",
"4ES:kernel-0:2.6.9-89.31.1.EL.s390x",
"4ES:kernel-0:2.6.9-89.31.1.EL.src",
"4ES:kernel-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-devel-0:2.6.9-89.31.1.EL.ia64",
"4ES:kernel-devel-0:2.6.9-89.31.1.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-89.31.1.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-89.31.1.EL.s390",
"4ES:kernel-devel-0:2.6.9-89.31.1.EL.s390x",
"4ES:kernel-devel-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-89.31.1.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-89.31.1.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-89.31.1.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-smp-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-xenU-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-0:2.6.9-89.31.1.EL.ia64",
"4WS:kernel-0:2.6.9-89.31.1.EL.ppc64",
"4WS:kernel-0:2.6.9-89.31.1.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-89.31.1.EL.s390",
"4WS:kernel-0:2.6.9-89.31.1.EL.s390x",
"4WS:kernel-0:2.6.9-89.31.1.EL.src",
"4WS:kernel-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-devel-0:2.6.9-89.31.1.EL.ia64",
"4WS:kernel-devel-0:2.6.9-89.31.1.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-89.31.1.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-89.31.1.EL.s390",
"4WS:kernel-devel-0:2.6.9-89.31.1.EL.s390x",
"4WS:kernel-devel-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-89.31.1.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-89.31.1.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-89.31.1.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-smp-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-xenU-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-89.31.1.EL.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2010-3477"
},
{
"category": "external",
"summary": "RHBZ#636386",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=636386"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2010-3477",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3477"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3477",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3477"
}
],
"release_date": "2010-09-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-10-19T18:46:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"4AS:kernel-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-0:2.6.9-89.31.1.EL.ia64",
"4AS:kernel-0:2.6.9-89.31.1.EL.ppc64",
"4AS:kernel-0:2.6.9-89.31.1.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-89.31.1.EL.s390",
"4AS:kernel-0:2.6.9-89.31.1.EL.s390x",
"4AS:kernel-0:2.6.9-89.31.1.EL.src",
"4AS:kernel-0:2.6.9-89.31.1.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-devel-0:2.6.9-89.31.1.EL.ia64",
"4AS:kernel-devel-0:2.6.9-89.31.1.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-89.31.1.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-89.31.1.EL.s390",
"4AS:kernel-devel-0:2.6.9-89.31.1.EL.s390x",
"4AS:kernel-devel-0:2.6.9-89.31.1.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-89.31.1.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-89.31.1.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-89.31.1.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-89.31.1.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-smp-0:2.6.9-89.31.1.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-89.31.1.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-xenU-0:2.6.9-89.31.1.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-0:2.6.9-89.31.1.EL.ia64",
"4Desktop:kernel-0:2.6.9-89.31.1.EL.ppc64",
"4Desktop:kernel-0:2.6.9-89.31.1.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-89.31.1.EL.s390",
"4Desktop:kernel-0:2.6.9-89.31.1.EL.s390x",
"4Desktop:kernel-0:2.6.9-89.31.1.EL.src",
"4Desktop:kernel-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-89.31.1.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-89.31.1.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-89.31.1.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-0:2.6.9-89.31.1.EL.ia64",
"4ES:kernel-0:2.6.9-89.31.1.EL.ppc64",
"4ES:kernel-0:2.6.9-89.31.1.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-89.31.1.EL.s390",
"4ES:kernel-0:2.6.9-89.31.1.EL.s390x",
"4ES:kernel-0:2.6.9-89.31.1.EL.src",
"4ES:kernel-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-devel-0:2.6.9-89.31.1.EL.ia64",
"4ES:kernel-devel-0:2.6.9-89.31.1.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-89.31.1.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-89.31.1.EL.s390",
"4ES:kernel-devel-0:2.6.9-89.31.1.EL.s390x",
"4ES:kernel-devel-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-89.31.1.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-89.31.1.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-89.31.1.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-smp-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-xenU-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-0:2.6.9-89.31.1.EL.ia64",
"4WS:kernel-0:2.6.9-89.31.1.EL.ppc64",
"4WS:kernel-0:2.6.9-89.31.1.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-89.31.1.EL.s390",
"4WS:kernel-0:2.6.9-89.31.1.EL.s390x",
"4WS:kernel-0:2.6.9-89.31.1.EL.src",
"4WS:kernel-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-devel-0:2.6.9-89.31.1.EL.ia64",
"4WS:kernel-devel-0:2.6.9-89.31.1.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-89.31.1.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-89.31.1.EL.s390",
"4WS:kernel-devel-0:2.6.9-89.31.1.EL.s390x",
"4WS:kernel-devel-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-89.31.1.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-89.31.1.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-89.31.1.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-smp-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-xenU-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-89.31.1.EL.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0779"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS:kernel-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-0:2.6.9-89.31.1.EL.ia64",
"4AS:kernel-0:2.6.9-89.31.1.EL.ppc64",
"4AS:kernel-0:2.6.9-89.31.1.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-89.31.1.EL.s390",
"4AS:kernel-0:2.6.9-89.31.1.EL.s390x",
"4AS:kernel-0:2.6.9-89.31.1.EL.src",
"4AS:kernel-0:2.6.9-89.31.1.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-89.31.1.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-devel-0:2.6.9-89.31.1.EL.ia64",
"4AS:kernel-devel-0:2.6.9-89.31.1.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-89.31.1.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-89.31.1.EL.s390",
"4AS:kernel-devel-0:2.6.9-89.31.1.EL.s390x",
"4AS:kernel-devel-0:2.6.9-89.31.1.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-89.31.1.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-89.31.1.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-89.31.1.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-89.31.1.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-smp-0:2.6.9-89.31.1.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-89.31.1.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-xenU-0:2.6.9-89.31.1.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-89.31.1.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-0:2.6.9-89.31.1.EL.ia64",
"4Desktop:kernel-0:2.6.9-89.31.1.EL.ppc64",
"4Desktop:kernel-0:2.6.9-89.31.1.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-89.31.1.EL.s390",
"4Desktop:kernel-0:2.6.9-89.31.1.EL.s390x",
"4Desktop:kernel-0:2.6.9-89.31.1.EL.src",
"4Desktop:kernel-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-89.31.1.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-89.31.1.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-89.31.1.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-89.31.1.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-89.31.1.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-0:2.6.9-89.31.1.EL.ia64",
"4ES:kernel-0:2.6.9-89.31.1.EL.ppc64",
"4ES:kernel-0:2.6.9-89.31.1.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-89.31.1.EL.s390",
"4ES:kernel-0:2.6.9-89.31.1.EL.s390x",
"4ES:kernel-0:2.6.9-89.31.1.EL.src",
"4ES:kernel-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-devel-0:2.6.9-89.31.1.EL.ia64",
"4ES:kernel-devel-0:2.6.9-89.31.1.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-89.31.1.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-89.31.1.EL.s390",
"4ES:kernel-devel-0:2.6.9-89.31.1.EL.s390x",
"4ES:kernel-devel-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-89.31.1.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-89.31.1.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-89.31.1.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-smp-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-xenU-0:2.6.9-89.31.1.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-89.31.1.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-0:2.6.9-89.31.1.EL.ia64",
"4WS:kernel-0:2.6.9-89.31.1.EL.ppc64",
"4WS:kernel-0:2.6.9-89.31.1.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-89.31.1.EL.s390",
"4WS:kernel-0:2.6.9-89.31.1.EL.s390x",
"4WS:kernel-0:2.6.9-89.31.1.EL.src",
"4WS:kernel-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-devel-0:2.6.9-89.31.1.EL.ia64",
"4WS:kernel-devel-0:2.6.9-89.31.1.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-89.31.1.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-89.31.1.EL.s390",
"4WS:kernel-devel-0:2.6.9-89.31.1.EL.s390x",
"4WS:kernel-devel-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-89.31.1.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-89.31.1.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-89.31.1.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-smp-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-xenU-0:2.6.9-89.31.1.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-89.31.1.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-89.31.1.EL.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net/sched/act_police.c infoleak"
}
]
}
RHSA-2010:0839
Vulnerability from csaf_redhat - Published: 2010-11-10 19:00 - Updated: 2025-11-21 17:37The io_submit_one function in fs/aio.c in the Linux kernel before 2.6.23 allows local users to cause a denial of service (NULL pointer dereference) via a crafted io_submit system call with an IOCB_FLAG_RESFD flag.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client:kernel-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-194.26.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-debuginfo-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-devel-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-doc-0:2.6.18-194.26.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-194.26.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-194.26.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-194.26.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-debuginfo-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-devel-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-doc-0:2.6.18-194.26.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-194.26.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-194.26.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
Integer overflow in the do_io_submit function in fs/aio.c in the Linux kernel before 2.6.36-rc4-next-20100915 allows local users to cause a denial of service or possibly have unspecified other impact via crafted use of the io_submit system call.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client:kernel-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-194.26.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-debuginfo-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-devel-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-doc-0:2.6.18-194.26.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-194.26.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-194.26.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-194.26.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-debuginfo-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-devel-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-doc-0:2.6.18-194.26.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-194.26.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-194.26.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
The xfs_ioc_fsgetxattr function in fs/xfs/linux-2.6/xfs_ioctl.c in the Linux kernel before 2.6.36-rc4 does not initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via an ioctl call.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client:kernel-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-194.26.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-debuginfo-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-devel-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-doc-0:2.6.18-194.26.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-194.26.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-194.26.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-194.26.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-debuginfo-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-devel-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-doc-0:2.6.18-194.26.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-194.26.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-194.26.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
include/asm-x86/futex.h in the Linux kernel before 2.6.25 does not properly implement exception fixup, which allows local users to cause a denial of service (panic) via an invalid application that triggers a page fault.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client:kernel-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-194.26.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-debuginfo-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-devel-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-doc-0:2.6.18-194.26.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-194.26.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-194.26.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-194.26.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-debuginfo-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-devel-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-doc-0:2.6.18-194.26.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-194.26.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-194.26.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
drivers/platform/x86/thinkpad_acpi.c in the Linux kernel before 2.6.34 on ThinkPad devices, when the X.Org X server is used, does not properly restrict access to the video output control state, which allows local users to cause a denial of service (system hang) via a (1) read or (2) write operation.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client:kernel-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-194.26.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-debuginfo-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-devel-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-doc-0:2.6.18-194.26.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-194.26.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-194.26.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-194.26.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-debuginfo-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-devel-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-doc-0:2.6.18-194.26.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-194.26.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-194.26.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
The tcf_act_police_dump function in net/sched/act_police.c in the actions implementation in the network queueing functionality in the Linux kernel before 2.6.36-rc4 does not properly initialize certain structure members, which allows local users to obtain potentially sensitive information from kernel memory via vectors involving a dump operation. NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-2942.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client:kernel-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-194.26.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-debuginfo-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-devel-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-doc-0:2.6.18-194.26.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-194.26.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-194.26.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-194.26.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-debuginfo-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-devel-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-doc-0:2.6.18-194.26.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-194.26.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-194.26.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-194.26.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-194.26.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-194.26.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-194.26.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-194.26.1.el5.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated kernel packages that fix multiple security issues and several bugs\nare now available for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues:\n\n* A NULL pointer dereference flaw was found in the io_submit_one() function\nin the Linux kernel asynchronous I/O implementation. A local, unprivileged\nuser could use this flaw to cause a denial of service. (CVE-2010-3066,\nModerate)\n\n* A flaw was found in the xfs_ioc_fsgetxattr() function in the Linux kernel\nXFS file system implementation. A data structure in xfs_ioc_fsgetxattr()\nwas not initialized properly before being copied to user-space. A local,\nunprivileged user could use this flaw to cause an information leak.\n(CVE-2010-3078, Moderate)\n\n* The exception fixup code for the __futex_atomic_op1, __futex_atomic_op2,\nand futex_atomic_cmpxchg_inatomic() macros replaced the LOCK prefix with a\nNOP instruction. A local, unprivileged user could use this flaw to cause a\ndenial of service. (CVE-2010-3086, Moderate)\n\n* A flaw was found in the tcf_act_police_dump() function in the Linux\nkernel network traffic policing implementation. A data structure in\ntcf_act_police_dump() was not initialized properly before being copied to\nuser-space. A local, unprivileged user could use this flaw to cause an\ninformation leak. (CVE-2010-3477, Moderate)\n\n* A missing upper bound integer check was found in the sys_io_submit()\nfunction in the Linux kernel asynchronous I/O implementation. A local,\nunprivileged user could use this flaw to cause an information leak.\n(CVE-2010-3067, Low)\n\nRed Hat would like to thank Tavis Ormandy for reporting CVE-2010-3066,\nCVE-2010-3086, and CVE-2010-3067, and Dan Rosenberg for reporting\nCVE-2010-3078.\n\nThis update also fixes several bugs. Documentation for these bug fixes will\nbe available shortly from the Technical Notes document linked to in the\nReferences section.\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2010:0839",
"url": "https://access.redhat.com/errata/RHSA-2010:0839"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5/html-single/5.5_Technical_Notes/index.html#RHSA-2010:0839",
"url": "http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5/html-single/5.5_Technical_Notes/index.html#RHSA-2010:0839"
},
{
"category": "external",
"summary": "619365",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=619365"
},
{
"category": "external",
"summary": "628889",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=628889"
},
{
"category": "external",
"summary": "629241",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=629241"
},
{
"category": "external",
"summary": "629441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=629441"
},
{
"category": "external",
"summary": "629861",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=629861"
},
{
"category": "external",
"summary": "630540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=630540"
},
{
"category": "external",
"summary": "630804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=630804"
},
{
"category": "external",
"summary": "630989",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=630989"
},
{
"category": "external",
"summary": "631716",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=631716"
},
{
"category": "external",
"summary": "632255",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=632255"
},
{
"category": "external",
"summary": "633170",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=633170"
},
{
"category": "external",
"summary": "634976",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=634976"
},
{
"category": "external",
"summary": "634977",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=634977"
},
{
"category": "external",
"summary": "636386",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=636386"
},
{
"category": "external",
"summary": "637069",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=637069"
},
{
"category": "external",
"summary": "637206",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=637206"
},
{
"category": "external",
"summary": "637220",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=637220"
},
{
"category": "external",
"summary": "637727",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=637727"
},
{
"category": "external",
"summary": "638579",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=638579"
},
{
"category": "external",
"summary": "638866",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=638866"
},
{
"category": "external",
"summary": "639073",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=639073"
},
{
"category": "external",
"summary": "640973",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=640973"
},
{
"category": "external",
"summary": "641915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=641915"
},
{
"category": "external",
"summary": "642465",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=642465"
},
{
"category": "external",
"summary": "642470",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=642470"
},
{
"category": "external",
"summary": "642628",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=642628"
},
{
"category": "external",
"summary": "643135",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=643135"
},
{
"category": "external",
"summary": "643571",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=643571"
},
{
"category": "external",
"summary": "643806",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=643806"
},
{
"category": "external",
"summary": "644822",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=644822"
},
{
"category": "external",
"summary": "647601",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=647601"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0839.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-11-21T17:37:03+00:00",
"generator": {
"date": "2025-11-21T17:37:03+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2010:0839",
"initial_release_date": "2010-11-10T19:00:00+00:00",
"revision_history": [
{
"date": "2010-11-10T19:00:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2010-11-09T13:06:20+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:37:03+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-194.26.1.el5.i686",
"product": {
"name": "kernel-debug-devel-0:2.6.18-194.26.1.el5.i686",
"product_id": "kernel-debug-devel-0:2.6.18-194.26.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-194.26.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-194.26.1.el5.i686",
"product": {
"name": "kernel-0:2.6.18-194.26.1.el5.i686",
"product_id": "kernel-0:2.6.18-194.26.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-194.26.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-devel-0:2.6.18-194.26.1.el5.i686",
"product": {
"name": "kernel-PAE-devel-0:2.6.18-194.26.1.el5.i686",
"product_id": "kernel-PAE-devel-0:2.6.18-194.26.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-194.26.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-194.26.1.el5.i686",
"product": {
"name": "kernel-debuginfo-0:2.6.18-194.26.1.el5.i686",
"product_id": "kernel-debuginfo-0:2.6.18-194.26.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-194.26.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-194.26.1.el5.i686",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-194.26.1.el5.i686",
"product_id": "kernel-debuginfo-common-0:2.6.18-194.26.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-194.26.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-194.26.1.el5.i686",
"product": {
"name": "kernel-xen-devel-0:2.6.18-194.26.1.el5.i686",
"product_id": "kernel-xen-devel-0:2.6.18-194.26.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-194.26.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-194.26.1.el5.i686",
"product": {
"name": "kernel-debug-0:2.6.18-194.26.1.el5.i686",
"product_id": "kernel-debug-0:2.6.18-194.26.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-194.26.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-debuginfo-0:2.6.18-194.26.1.el5.i686",
"product": {
"name": "kernel-PAE-debuginfo-0:2.6.18-194.26.1.el5.i686",
"product_id": "kernel-PAE-debuginfo-0:2.6.18-194.26.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-194.26.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-0:2.6.18-194.26.1.el5.i686",
"product": {
"name": "kernel-PAE-0:2.6.18-194.26.1.el5.i686",
"product_id": "kernel-PAE-0:2.6.18-194.26.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-194.26.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-194.26.1.el5.i686",
"product": {
"name": "kernel-devel-0:2.6.18-194.26.1.el5.i686",
"product_id": "kernel-devel-0:2.6.18-194.26.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-194.26.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.i686",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.i686",
"product_id": "kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-194.26.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.i686",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.i686",
"product_id": "kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-194.26.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-194.26.1.el5.i686",
"product": {
"name": "kernel-xen-0:2.6.18-194.26.1.el5.i686",
"product_id": "kernel-xen-0:2.6.18-194.26.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-194.26.1.el5?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-194.26.1.el5.i386",
"product": {
"name": "kernel-headers-0:2.6.18-194.26.1.el5.i386",
"product_id": "kernel-headers-0:2.6.18-194.26.1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-194.26.1.el5?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-194.26.1.el5.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.18-194.26.1.el5.x86_64",
"product_id": "kernel-debug-devel-0:2.6.18-194.26.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-194.26.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-194.26.1.el5.x86_64",
"product": {
"name": "kernel-0:2.6.18-194.26.1.el5.x86_64",
"product_id": "kernel-0:2.6.18-194.26.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-194.26.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"product_id": "kernel-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-194.26.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-194.26.1.el5.x86_64",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-194.26.1.el5.x86_64",
"product_id": "kernel-debuginfo-common-0:2.6.18-194.26.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-194.26.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-194.26.1.el5.x86_64",
"product": {
"name": "kernel-xen-devel-0:2.6.18-194.26.1.el5.x86_64",
"product_id": "kernel-xen-devel-0:2.6.18-194.26.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-194.26.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-194.26.1.el5.x86_64",
"product": {
"name": "kernel-headers-0:2.6.18-194.26.1.el5.x86_64",
"product_id": "kernel-headers-0:2.6.18-194.26.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-194.26.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-194.26.1.el5.x86_64",
"product": {
"name": "kernel-debug-0:2.6.18-194.26.1.el5.x86_64",
"product_id": "kernel-debug-0:2.6.18-194.26.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-194.26.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-194.26.1.el5.x86_64",
"product": {
"name": "kernel-devel-0:2.6.18-194.26.1.el5.x86_64",
"product_id": "kernel-devel-0:2.6.18-194.26.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-194.26.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"product_id": "kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-194.26.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-194.26.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-194.26.1.el5.x86_64",
"product": {
"name": "kernel-xen-0:2.6.18-194.26.1.el5.x86_64",
"product_id": "kernel-xen-0:2.6.18-194.26.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-194.26.1.el5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.18-194.26.1.el5.src",
"product": {
"name": "kernel-0:2.6.18-194.26.1.el5.src",
"product_id": "kernel-0:2.6.18-194.26.1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-194.26.1.el5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:2.6.18-194.26.1.el5.noarch",
"product": {
"name": "kernel-doc-0:2.6.18-194.26.1.el5.noarch",
"product_id": "kernel-doc-0:2.6.18-194.26.1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.18-194.26.1.el5?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-kdump-0:2.6.18-194.26.1.el5.ppc64",
"product": {
"name": "kernel-kdump-0:2.6.18-194.26.1.el5.ppc64",
"product_id": "kernel-kdump-0:2.6.18-194.26.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-194.26.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-194.26.1.el5.ppc64",
"product": {
"name": "kernel-debug-devel-0:2.6.18-194.26.1.el5.ppc64",
"product_id": "kernel-debug-devel-0:2.6.18-194.26.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-194.26.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-194.26.1.el5.ppc64",
"product": {
"name": "kernel-0:2.6.18-194.26.1.el5.ppc64",
"product_id": "kernel-0:2.6.18-194.26.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-194.26.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"product": {
"name": "kernel-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"product_id": "kernel-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-194.26.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ppc64",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ppc64",
"product_id": "kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-194.26.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-194.26.1.el5.ppc64",
"product": {
"name": "kernel-headers-0:2.6.18-194.26.1.el5.ppc64",
"product_id": "kernel-headers-0:2.6.18-194.26.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-194.26.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:2.6.18-194.26.1.el5.ppc64",
"product": {
"name": "kernel-kdump-devel-0:2.6.18-194.26.1.el5.ppc64",
"product_id": "kernel-kdump-devel-0:2.6.18-194.26.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-194.26.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-194.26.1.el5.ppc64",
"product": {
"name": "kernel-debug-0:2.6.18-194.26.1.el5.ppc64",
"product_id": "kernel-debug-0:2.6.18-194.26.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-194.26.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-194.26.1.el5.ppc64",
"product": {
"name": "kernel-devel-0:2.6.18-194.26.1.el5.ppc64",
"product_id": "kernel-devel-0:2.6.18-194.26.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-194.26.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"product_id": "kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-194.26.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"product": {
"name": "kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"product_id": "kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-194.26.1.el5?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-194.26.1.el5.ppc",
"product": {
"name": "kernel-headers-0:2.6.18-194.26.1.el5.ppc",
"product_id": "kernel-headers-0:2.6.18-194.26.1.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-194.26.1.el5?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-kdump-0:2.6.18-194.26.1.el5.s390x",
"product": {
"name": "kernel-kdump-0:2.6.18-194.26.1.el5.s390x",
"product_id": "kernel-kdump-0:2.6.18-194.26.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-194.26.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-194.26.1.el5.s390x",
"product": {
"name": "kernel-debug-devel-0:2.6.18-194.26.1.el5.s390x",
"product_id": "kernel-debug-devel-0:2.6.18-194.26.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-194.26.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-194.26.1.el5.s390x",
"product": {
"name": "kernel-0:2.6.18-194.26.1.el5.s390x",
"product_id": "kernel-0:2.6.18-194.26.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-194.26.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"product": {
"name": "kernel-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"product_id": "kernel-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-194.26.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-194.26.1.el5.s390x",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-194.26.1.el5.s390x",
"product_id": "kernel-debuginfo-common-0:2.6.18-194.26.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-194.26.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-194.26.1.el5.s390x",
"product": {
"name": "kernel-headers-0:2.6.18-194.26.1.el5.s390x",
"product_id": "kernel-headers-0:2.6.18-194.26.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-194.26.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:2.6.18-194.26.1.el5.s390x",
"product": {
"name": "kernel-kdump-devel-0:2.6.18-194.26.1.el5.s390x",
"product_id": "kernel-kdump-devel-0:2.6.18-194.26.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-194.26.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-194.26.1.el5.s390x",
"product": {
"name": "kernel-debug-0:2.6.18-194.26.1.el5.s390x",
"product_id": "kernel-debug-0:2.6.18-194.26.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-194.26.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-194.26.1.el5.s390x",
"product": {
"name": "kernel-devel-0:2.6.18-194.26.1.el5.s390x",
"product_id": "kernel-devel-0:2.6.18-194.26.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-194.26.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"product_id": "kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-194.26.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"product_id": "kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-194.26.1.el5?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-194.26.1.el5.ia64",
"product": {
"name": "kernel-debug-devel-0:2.6.18-194.26.1.el5.ia64",
"product_id": "kernel-debug-devel-0:2.6.18-194.26.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-194.26.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-194.26.1.el5.ia64",
"product": {
"name": "kernel-0:2.6.18-194.26.1.el5.ia64",
"product_id": "kernel-0:2.6.18-194.26.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-194.26.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"product": {
"name": "kernel-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"product_id": "kernel-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-194.26.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ia64",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ia64",
"product_id": "kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-194.26.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-194.26.1.el5.ia64",
"product": {
"name": "kernel-xen-devel-0:2.6.18-194.26.1.el5.ia64",
"product_id": "kernel-xen-devel-0:2.6.18-194.26.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-194.26.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-194.26.1.el5.ia64",
"product": {
"name": "kernel-headers-0:2.6.18-194.26.1.el5.ia64",
"product_id": "kernel-headers-0:2.6.18-194.26.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-194.26.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-194.26.1.el5.ia64",
"product": {
"name": "kernel-debug-0:2.6.18-194.26.1.el5.ia64",
"product_id": "kernel-debug-0:2.6.18-194.26.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-194.26.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-194.26.1.el5.ia64",
"product": {
"name": "kernel-devel-0:2.6.18-194.26.1.el5.ia64",
"product_id": "kernel-devel-0:2.6.18-194.26.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-194.26.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"product_id": "kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-194.26.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"product_id": "kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-194.26.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-194.26.1.el5.ia64",
"product": {
"name": "kernel-xen-0:2.6.18-194.26.1.el5.ia64",
"product_id": "kernel-xen-0:2.6.18-194.26.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-194.26.1.el5?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-194.26.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-194.26.1.el5.i686"
},
"product_reference": "kernel-0:2.6.18-194.26.1.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-194.26.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-194.26.1.el5.ia64"
},
"product_reference": "kernel-0:2.6.18-194.26.1.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-194.26.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-194.26.1.el5.ppc64"
},
"product_reference": "kernel-0:2.6.18-194.26.1.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-194.26.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-194.26.1.el5.s390x"
},
"product_reference": "kernel-0:2.6.18-194.26.1.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-194.26.1.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-194.26.1.el5.src"
},
"product_reference": "kernel-0:2.6.18-194.26.1.el5.src",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-194.26.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-194.26.1.el5.x86_64"
},
"product_reference": "kernel-0:2.6.18-194.26.1.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-0:2.6.18-194.26.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-PAE-0:2.6.18-194.26.1.el5.i686"
},
"product_reference": "kernel-PAE-0:2.6.18-194.26.1.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-debuginfo-0:2.6.18-194.26.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-PAE-debuginfo-0:2.6.18-194.26.1.el5.i686"
},
"product_reference": "kernel-PAE-debuginfo-0:2.6.18-194.26.1.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-devel-0:2.6.18-194.26.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-PAE-devel-0:2.6.18-194.26.1.el5.i686"
},
"product_reference": "kernel-PAE-devel-0:2.6.18-194.26.1.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-194.26.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-0:2.6.18-194.26.1.el5.i686"
},
"product_reference": "kernel-debug-0:2.6.18-194.26.1.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-194.26.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-0:2.6.18-194.26.1.el5.ia64"
},
"product_reference": "kernel-debug-0:2.6.18-194.26.1.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-194.26.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-0:2.6.18-194.26.1.el5.ppc64"
},
"product_reference": "kernel-debug-0:2.6.18-194.26.1.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-194.26.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-0:2.6.18-194.26.1.el5.s390x"
},
"product_reference": "kernel-debug-0:2.6.18-194.26.1.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-194.26.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-0:2.6.18-194.26.1.el5.x86_64"
},
"product_reference": "kernel-debug-0:2.6.18-194.26.1.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ia64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-194.26.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.18-194.26.1.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-194.26.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.ia64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-194.26.1.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-194.26.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-194.26.1.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-194.26.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.18-194.26.1.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-194.26.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-194.26.1.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-194.26.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.18-194.26.1.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-194.26.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-194.26.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-194.26.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-194.26.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-194.26.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.i686"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-194.26.1.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ia64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ppc64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-194.26.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.s390x"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-194.26.1.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-194.26.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.x86_64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-194.26.1.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-194.26.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-devel-0:2.6.18-194.26.1.el5.i686"
},
"product_reference": "kernel-devel-0:2.6.18-194.26.1.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-194.26.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-devel-0:2.6.18-194.26.1.el5.ia64"
},
"product_reference": "kernel-devel-0:2.6.18-194.26.1.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-194.26.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-devel-0:2.6.18-194.26.1.el5.ppc64"
},
"product_reference": "kernel-devel-0:2.6.18-194.26.1.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-194.26.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-devel-0:2.6.18-194.26.1.el5.s390x"
},
"product_reference": "kernel-devel-0:2.6.18-194.26.1.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-194.26.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-devel-0:2.6.18-194.26.1.el5.x86_64"
},
"product_reference": "kernel-devel-0:2.6.18-194.26.1.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.18-194.26.1.el5.noarch as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-doc-0:2.6.18-194.26.1.el5.noarch"
},
"product_reference": "kernel-doc-0:2.6.18-194.26.1.el5.noarch",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-194.26.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-194.26.1.el5.i386"
},
"product_reference": "kernel-headers-0:2.6.18-194.26.1.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-194.26.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-194.26.1.el5.ia64"
},
"product_reference": "kernel-headers-0:2.6.18-194.26.1.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-194.26.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-194.26.1.el5.ppc"
},
"product_reference": "kernel-headers-0:2.6.18-194.26.1.el5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-194.26.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-194.26.1.el5.ppc64"
},
"product_reference": "kernel-headers-0:2.6.18-194.26.1.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-194.26.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-194.26.1.el5.s390x"
},
"product_reference": "kernel-headers-0:2.6.18-194.26.1.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-194.26.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-194.26.1.el5.x86_64"
},
"product_reference": "kernel-headers-0:2.6.18-194.26.1.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.18-194.26.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-kdump-0:2.6.18-194.26.1.el5.ppc64"
},
"product_reference": "kernel-kdump-0:2.6.18-194.26.1.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.18-194.26.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-kdump-0:2.6.18-194.26.1.el5.s390x"
},
"product_reference": "kernel-kdump-0:2.6.18-194.26.1.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.ppc64"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.18-194.26.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-kdump-devel-0:2.6.18-194.26.1.el5.ppc64"
},
"product_reference": "kernel-kdump-devel-0:2.6.18-194.26.1.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.18-194.26.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-kdump-devel-0:2.6.18-194.26.1.el5.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.18-194.26.1.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-194.26.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-0:2.6.18-194.26.1.el5.i686"
},
"product_reference": "kernel-xen-0:2.6.18-194.26.1.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-194.26.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-0:2.6.18-194.26.1.el5.ia64"
},
"product_reference": "kernel-xen-0:2.6.18-194.26.1.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-194.26.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-0:2.6.18-194.26.1.el5.x86_64"
},
"product_reference": "kernel-xen-0:2.6.18-194.26.1.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.i686"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.ia64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.x86_64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-194.26.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-devel-0:2.6.18-194.26.1.el5.i686"
},
"product_reference": "kernel-xen-devel-0:2.6.18-194.26.1.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-194.26.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-devel-0:2.6.18-194.26.1.el5.ia64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-194.26.1.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-194.26.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-devel-0:2.6.18-194.26.1.el5.x86_64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-194.26.1.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-194.26.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-194.26.1.el5.i686"
},
"product_reference": "kernel-0:2.6.18-194.26.1.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-194.26.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-194.26.1.el5.ia64"
},
"product_reference": "kernel-0:2.6.18-194.26.1.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-194.26.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-194.26.1.el5.ppc64"
},
"product_reference": "kernel-0:2.6.18-194.26.1.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-194.26.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-194.26.1.el5.s390x"
},
"product_reference": "kernel-0:2.6.18-194.26.1.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-194.26.1.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-194.26.1.el5.src"
},
"product_reference": "kernel-0:2.6.18-194.26.1.el5.src",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-194.26.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-194.26.1.el5.x86_64"
},
"product_reference": "kernel-0:2.6.18-194.26.1.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-0:2.6.18-194.26.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-PAE-0:2.6.18-194.26.1.el5.i686"
},
"product_reference": "kernel-PAE-0:2.6.18-194.26.1.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-debuginfo-0:2.6.18-194.26.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-PAE-debuginfo-0:2.6.18-194.26.1.el5.i686"
},
"product_reference": "kernel-PAE-debuginfo-0:2.6.18-194.26.1.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-devel-0:2.6.18-194.26.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-PAE-devel-0:2.6.18-194.26.1.el5.i686"
},
"product_reference": "kernel-PAE-devel-0:2.6.18-194.26.1.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-194.26.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-0:2.6.18-194.26.1.el5.i686"
},
"product_reference": "kernel-debug-0:2.6.18-194.26.1.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-194.26.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-0:2.6.18-194.26.1.el5.ia64"
},
"product_reference": "kernel-debug-0:2.6.18-194.26.1.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-194.26.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-0:2.6.18-194.26.1.el5.ppc64"
},
"product_reference": "kernel-debug-0:2.6.18-194.26.1.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-194.26.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-0:2.6.18-194.26.1.el5.s390x"
},
"product_reference": "kernel-debug-0:2.6.18-194.26.1.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-194.26.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-0:2.6.18-194.26.1.el5.x86_64"
},
"product_reference": "kernel-debug-0:2.6.18-194.26.1.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ia64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-194.26.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.18-194.26.1.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-194.26.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.ia64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-194.26.1.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-194.26.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-194.26.1.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-194.26.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.18-194.26.1.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-194.26.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-194.26.1.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-194.26.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.18-194.26.1.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-194.26.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-194.26.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-194.26.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-194.26.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-194.26.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.i686"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-194.26.1.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ia64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ppc64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-194.26.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.s390x"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-194.26.1.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-194.26.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.x86_64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-194.26.1.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-194.26.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-devel-0:2.6.18-194.26.1.el5.i686"
},
"product_reference": "kernel-devel-0:2.6.18-194.26.1.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-194.26.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-devel-0:2.6.18-194.26.1.el5.ia64"
},
"product_reference": "kernel-devel-0:2.6.18-194.26.1.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-194.26.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-devel-0:2.6.18-194.26.1.el5.ppc64"
},
"product_reference": "kernel-devel-0:2.6.18-194.26.1.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-194.26.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-devel-0:2.6.18-194.26.1.el5.s390x"
},
"product_reference": "kernel-devel-0:2.6.18-194.26.1.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-194.26.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-devel-0:2.6.18-194.26.1.el5.x86_64"
},
"product_reference": "kernel-devel-0:2.6.18-194.26.1.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.18-194.26.1.el5.noarch as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-doc-0:2.6.18-194.26.1.el5.noarch"
},
"product_reference": "kernel-doc-0:2.6.18-194.26.1.el5.noarch",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-194.26.1.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-194.26.1.el5.i386"
},
"product_reference": "kernel-headers-0:2.6.18-194.26.1.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-194.26.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-194.26.1.el5.ia64"
},
"product_reference": "kernel-headers-0:2.6.18-194.26.1.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-194.26.1.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-194.26.1.el5.ppc"
},
"product_reference": "kernel-headers-0:2.6.18-194.26.1.el5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-194.26.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-194.26.1.el5.ppc64"
},
"product_reference": "kernel-headers-0:2.6.18-194.26.1.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-194.26.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-194.26.1.el5.s390x"
},
"product_reference": "kernel-headers-0:2.6.18-194.26.1.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-194.26.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-194.26.1.el5.x86_64"
},
"product_reference": "kernel-headers-0:2.6.18-194.26.1.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.18-194.26.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-kdump-0:2.6.18-194.26.1.el5.ppc64"
},
"product_reference": "kernel-kdump-0:2.6.18-194.26.1.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.18-194.26.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-kdump-0:2.6.18-194.26.1.el5.s390x"
},
"product_reference": "kernel-kdump-0:2.6.18-194.26.1.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.ppc64"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.18-194.26.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-kdump-devel-0:2.6.18-194.26.1.el5.ppc64"
},
"product_reference": "kernel-kdump-devel-0:2.6.18-194.26.1.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.18-194.26.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-kdump-devel-0:2.6.18-194.26.1.el5.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.18-194.26.1.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-194.26.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-0:2.6.18-194.26.1.el5.i686"
},
"product_reference": "kernel-xen-0:2.6.18-194.26.1.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-194.26.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-0:2.6.18-194.26.1.el5.ia64"
},
"product_reference": "kernel-xen-0:2.6.18-194.26.1.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-194.26.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-0:2.6.18-194.26.1.el5.x86_64"
},
"product_reference": "kernel-xen-0:2.6.18-194.26.1.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.i686"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.ia64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.x86_64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-194.26.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-devel-0:2.6.18-194.26.1.el5.i686"
},
"product_reference": "kernel-xen-devel-0:2.6.18-194.26.1.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-194.26.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-devel-0:2.6.18-194.26.1.el5.ia64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-194.26.1.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-194.26.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-devel-0:2.6.18-194.26.1.el5.x86_64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-194.26.1.el5.x86_64",
"relates_to_product_reference": "5Server"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Tavis Ormandy"
]
}
],
"cve": "CVE-2010-3066",
"discovery_date": "2010-09-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "631716"
}
],
"notes": [
{
"category": "description",
"text": "The io_submit_one function in fs/aio.c in the Linux kernel before 2.6.23 allows local users to cause a denial of service (NULL pointer dereference) via a crafted io_submit system call with an IOCB_FLAG_RESFD flag.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: io_submit_one() NULL ptr deref",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the version of Linux kernel as shipped with Red Hat\nEnterprise Linux 3 and 4 as they did not include support for eventfd in the\nAsync I/O (AIO) implementation. It did not affect the version of Linux kernel\nas shipped with Red Hat Enterprise MRG as it has already had the fix to this\nissue. This issue was addressed in Red Hat Enterprise Linux 5 via https://rhn.redhat.com/errata/RHSA-2010-0839.html",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-0:2.6.18-194.26.1.el5.src",
"5Client:kernel-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-194.26.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-0:2.6.18-194.26.1.el5.src",
"5Server:kernel-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-194.26.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-194.26.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2010-3066"
},
{
"category": "external",
"summary": "RHBZ#631716",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=631716"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2010-3066",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3066"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3066",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3066"
}
],
"release_date": "2007-08-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-11-10T19:00:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"5Client:kernel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-0:2.6.18-194.26.1.el5.src",
"5Client:kernel-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-194.26.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-0:2.6.18-194.26.1.el5.src",
"5Server:kernel-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-194.26.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-194.26.1.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0839"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 4.9,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"products": [
"5Client:kernel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-0:2.6.18-194.26.1.el5.src",
"5Client:kernel-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-194.26.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-0:2.6.18-194.26.1.el5.src",
"5Server:kernel-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-194.26.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-194.26.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: io_submit_one() NULL ptr deref"
},
{
"acknowledgments": [
{
"names": [
"Tavis Ormandy"
]
}
],
"cve": "CVE-2010-3067",
"discovery_date": "2010-09-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "629441"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in the do_io_submit function in fs/aio.c in the Linux kernel before 2.6.36-rc4-next-20100915 allows local users to cause a denial of service or possibly have unspecified other impact via crafted use of the io_submit system call.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: do_io_submit() infoleak",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-0:2.6.18-194.26.1.el5.src",
"5Client:kernel-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-194.26.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-0:2.6.18-194.26.1.el5.src",
"5Server:kernel-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-194.26.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-194.26.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2010-3067"
},
{
"category": "external",
"summary": "RHBZ#629441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=629441"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2010-3067",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3067"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3067",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3067"
}
],
"release_date": "2010-09-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-11-10T19:00:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"5Client:kernel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-0:2.6.18-194.26.1.el5.src",
"5Client:kernel-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-194.26.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-0:2.6.18-194.26.1.el5.src",
"5Server:kernel-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-194.26.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-194.26.1.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0839"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Client:kernel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-0:2.6.18-194.26.1.el5.src",
"5Client:kernel-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-194.26.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-0:2.6.18-194.26.1.el5.src",
"5Server:kernel-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-194.26.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-194.26.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: do_io_submit() infoleak"
},
{
"acknowledgments": [
{
"names": [
"Dan Rosenberg"
]
}
],
"cve": "CVE-2010-3078",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2010-09-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "630804"
}
],
"notes": [
{
"category": "description",
"text": "The xfs_ioc_fsgetxattr function in fs/xfs/linux-2.6/xfs_ioctl.c in the Linux kernel before 2.6.36-rc4 does not initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via an ioctl call.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: xfs: XFS_IOC_FSGETXATTR ioctl memory leak",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the version of Linux kernel as shipped with Red Hat\nEnterprise Linux 3, 4, and Red Hat Enterprise MRG as they did not include\nsupport for the XFS file system. This issue was addressed in Red Hat Enterprise Linux 5 via https://rhn.redhat.com/errata/RHSA-2010-0839.html",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-0:2.6.18-194.26.1.el5.src",
"5Client:kernel-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-194.26.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-0:2.6.18-194.26.1.el5.src",
"5Server:kernel-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-194.26.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-194.26.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2010-3078"
},
{
"category": "external",
"summary": "RHBZ#630804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=630804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2010-3078",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3078"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3078",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3078"
}
],
"release_date": "2010-09-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-11-10T19:00:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"5Client:kernel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-0:2.6.18-194.26.1.el5.src",
"5Client:kernel-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-194.26.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-0:2.6.18-194.26.1.el5.src",
"5Server:kernel-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-194.26.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-194.26.1.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0839"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Client:kernel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-0:2.6.18-194.26.1.el5.src",
"5Client:kernel-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-194.26.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-0:2.6.18-194.26.1.el5.src",
"5Server:kernel-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-194.26.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-194.26.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: xfs: XFS_IOC_FSGETXATTR ioctl memory leak"
},
{
"acknowledgments": [
{
"names": [
"Tavis Ormandy"
]
}
],
"cve": "CVE-2010-3086",
"discovery_date": "2010-09-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "633170"
}
],
"notes": [
{
"category": "description",
"text": "include/asm-x86/futex.h in the Linux kernel before 2.6.25 does not properly implement exception fixup, which allows local users to cause a denial of service (panic) via an invalid application that triggers a page fault.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel panic via futex",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the version of Linux kernel as shipped with Red Hat\nEnterprise Linux 3 and 4 as they did not support for the FUTEX_LOCK_PI futex operation. It did not affect the version of Linux kernel as shipped with Red Hat Enterprise MRG as it has already had the fix to this issue. This issue was addressed in Red Hat Enterprise Linux 5 via https://rhn.redhat.com/errata/RHSA-2010-0839.html",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-0:2.6.18-194.26.1.el5.src",
"5Client:kernel-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-194.26.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-0:2.6.18-194.26.1.el5.src",
"5Server:kernel-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-194.26.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-194.26.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2010-3086"
},
{
"category": "external",
"summary": "RHBZ#633170",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=633170"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2010-3086",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3086"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3086",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3086"
}
],
"release_date": "2010-11-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-11-10T19:00:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"5Client:kernel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-0:2.6.18-194.26.1.el5.src",
"5Client:kernel-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-194.26.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-0:2.6.18-194.26.1.el5.src",
"5Server:kernel-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-194.26.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-194.26.1.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0839"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 4.9,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"products": [
"5Client:kernel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-0:2.6.18-194.26.1.el5.src",
"5Client:kernel-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-194.26.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-0:2.6.18-194.26.1.el5.src",
"5Server:kernel-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-194.26.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-194.26.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel panic via futex"
},
{
"cve": "CVE-2010-3448",
"discovery_date": "2010-06-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "652122"
}
],
"notes": [
{
"category": "description",
"text": "drivers/platform/x86/thinkpad_acpi.c in the Linux kernel before 2.6.34 on ThinkPad devices, when the X.Org X server is used, does not properly restrict access to the video output control state, which allows local users to cause a denial of service (system hang) via a (1) read or (2) write operation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: thinkpad-acpi: lock down video output state access",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-0:2.6.18-194.26.1.el5.src",
"5Client:kernel-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-194.26.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-0:2.6.18-194.26.1.el5.src",
"5Server:kernel-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-194.26.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-194.26.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2010-3448"
},
{
"category": "external",
"summary": "RHBZ#652122",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=652122"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2010-3448",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3448"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3448",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3448"
}
],
"release_date": "2010-02-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-11-10T19:00:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"5Client:kernel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-0:2.6.18-194.26.1.el5.src",
"5Client:kernel-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-194.26.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-0:2.6.18-194.26.1.el5.src",
"5Server:kernel-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-194.26.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-194.26.1.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0839"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 4.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:H/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"products": [
"5Client:kernel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-0:2.6.18-194.26.1.el5.src",
"5Client:kernel-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-194.26.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-0:2.6.18-194.26.1.el5.src",
"5Server:kernel-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-194.26.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-194.26.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: thinkpad-acpi: lock down video output state access"
},
{
"cve": "CVE-2010-3477",
"discovery_date": "2010-09-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "636386"
}
],
"notes": [
{
"category": "description",
"text": "The tcf_act_police_dump function in net/sched/act_police.c in the actions implementation in the network queueing functionality in the Linux kernel before 2.6.36-rc4 does not properly initialize certain structure members, which allows local users to obtain potentially sensitive information from kernel memory via vectors involving a dump operation. NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-2942.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net/sched/act_police.c infoleak",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-0:2.6.18-194.26.1.el5.src",
"5Client:kernel-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-194.26.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-0:2.6.18-194.26.1.el5.src",
"5Server:kernel-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-194.26.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-194.26.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2010-3477"
},
{
"category": "external",
"summary": "RHBZ#636386",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=636386"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2010-3477",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3477"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3477",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3477"
}
],
"release_date": "2010-09-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-11-10T19:00:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"5Client:kernel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-0:2.6.18-194.26.1.el5.src",
"5Client:kernel-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-194.26.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-0:2.6.18-194.26.1.el5.src",
"5Server:kernel-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-194.26.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-194.26.1.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0839"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Client:kernel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-0:2.6.18-194.26.1.el5.src",
"5Client:kernel-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-194.26.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-194.26.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-194.26.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-194.26.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-0:2.6.18-194.26.1.el5.src",
"5Server:kernel-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-194.26.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-194.26.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-194.26.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.26.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-194.26.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-194.26.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-194.26.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net/sched/act_police.c infoleak"
}
]
}
RHSA-2010_0758
Vulnerability from csaf_redhat - Published: 2010-10-08 02:08 - Updated: 2024-11-22 03:56Integer overflow in the do_io_submit function in fs/aio.c in the Linux kernel before 2.6.36-rc4-next-20100915 allows local users to cause a denial of service or possibly have unspecified other impact via crafted use of the io_submit system call.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-169.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-169.el5rt.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-169.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-169.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-169.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-169.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-169.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-169.el5rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-169.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-169.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-169.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-169.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.x86_64 | — |
Vendor Fix
fix
|
The compat_alloc_user_space functions in include/asm/compat.h files in the Linux kernel before 2.6.36-rc4-git2 on 64-bit platforms do not properly allocate the userspace memory required for the 32-bit compatibility layer, which allows local users to gain privileges by leveraging the ability of the compat_mc_getsockopt function (aka the MCAST_MSFILTER getsockopt support) to control a certain length value, related to a "stack pointer underflow" issue, as exploited in the wild in September 2010.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-169.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-169.el5rt.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-169.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-169.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-169.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-169.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-169.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-169.el5rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-169.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-169.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-169.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-169.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated kernel-rt packages that fix two security issues and three bugs are\nnow available for Red Hat Enterprise MRG 1.2.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues:\n\n* The compat_alloc_user_space() function in the Linux kernel 32/64-bit\ncompatibility layer implementation was missing sanity checks. This function\ncould be abused in other areas of the Linux kernel if its length argument\ncan be controlled from user-space. On 64-bit systems, a local, unprivileged\nuser could use this flaw to escalate their privileges. (CVE-2010-3081,\nImportant)\n\n* A missing upper bound integer check was found in the sys_io_submit()\nfunction in the Linux kernel asynchronous I/O implementation. A local,\nunprivileged user could use this flaw to cause an information leak.\n(CVE-2010-3067, Low)\n\nRed Hat would like to thank Ben Hawkes for reporting CVE-2010-3081, and\nTavis Ormandy for reporting CVE-2010-3067.\n\nThis update also fixes the following bugs:\n\n* The RHSA-2010:0631 kernel-rt update resolved an issue (CVE-2010-2240)\nwhere, when an application has a stack overflow, the stack could silently\noverwrite another memory mapped area instead of a segmentation fault\noccurring. This update implements the official upstream fixes for that\nissue. Note: This is not a security regression. The original fix was\ncomplete. (BZ#624604)\n\n* In certain circumstances, under heavy load, certain network interface\ncards using the bnx2 driver, and configured to use MSI-X, could stop\nprocessing interrupts and then network connectivity would cease.\n(BZ#622952)\n\n* This update upgrades the tg3 driver to version 3.110. (BZ#640334)\n\nUsers are advised to upgrade to these updated packages, which contain\nbackported patches to correct these issues. The system must be rebooted for\nthis update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2010:0758",
"url": "https://access.redhat.com/errata/RHSA-2010:0758"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/kb/docs/DOC-40265",
"url": "https://access.redhat.com/kb/docs/DOC-40265"
},
{
"category": "external",
"summary": "624604",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=624604"
},
{
"category": "external",
"summary": "629441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=629441"
},
{
"category": "external",
"summary": "634457",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=634457"
},
{
"category": "external",
"summary": "640334",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=640334"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0758.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2024-11-22T03:56:39+00:00",
"generator": {
"date": "2024-11-22T03:56:39+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2010:0758",
"initial_release_date": "2010-10-08T02:08:00+00:00",
"revision_history": [
{
"date": "2010-10-08T02:08:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2010-10-07T22:12:02+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T03:56:39+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "MRG Realtime for RHEL 5 Server",
"product": {
"name": "MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_mrg:1::el5"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise MRG for RHEL-5"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-trace-0:2.6.24.7-169.el5rt.i686",
"product": {
"name": "kernel-rt-trace-0:2.6.24.7-169.el5rt.i686",
"product_id": "kernel-rt-trace-0:2.6.24.7-169.el5rt.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace@2.6.24.7-169.el5rt?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.i686",
"product": {
"name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.i686",
"product_id": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@2.6.24.7-169.el5rt?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.i686",
"product": {
"name": "kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.i686",
"product_id": "kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@2.6.24.7-169.el5rt?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.i686",
"product": {
"name": "kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.i686",
"product_id": "kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@2.6.24.7-169.el5rt?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.i686",
"product": {
"name": "kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.i686",
"product_id": "kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@2.6.24.7-169.el5rt?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.i686",
"product": {
"name": "kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.i686",
"product_id": "kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@2.6.24.7-169.el5rt?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.i686",
"product": {
"name": "kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.i686",
"product_id": "kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-devel@2.6.24.7-169.el5rt?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:2.6.24.7-169.el5rt.i686",
"product": {
"name": "kernel-rt-debug-0:2.6.24.7-169.el5rt.i686",
"product_id": "kernel-rt-debug-0:2.6.24.7-169.el5rt.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@2.6.24.7-169.el5rt?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.i686",
"product": {
"name": "kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.i686",
"product_id": "kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common@2.6.24.7-169.el5rt?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-0:2.6.24.7-169.el5rt.i686",
"product": {
"name": "kernel-rt-0:2.6.24.7-169.el5rt.i686",
"product_id": "kernel-rt-0:2.6.24.7-169.el5rt.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-169.el5rt?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.i686",
"product": {
"name": "kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.i686",
"product_id": "kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@2.6.24.7-169.el5rt?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:2.6.24.7-169.el5rt.i686",
"product": {
"name": "kernel-rt-devel-0:2.6.24.7-169.el5rt.i686",
"product_id": "kernel-rt-devel-0:2.6.24.7-169.el5rt.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@2.6.24.7-169.el5rt?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-vanilla-0:2.6.24.7-169.el5rt.i686",
"product": {
"name": "kernel-rt-vanilla-0:2.6.24.7-169.el5rt.i686",
"product_id": "kernel-rt-vanilla-0:2.6.24.7-169.el5rt.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-vanilla@2.6.24.7-169.el5rt?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-trace-0:2.6.24.7-169.el5rt.x86_64",
"product": {
"name": "kernel-rt-trace-0:2.6.24.7-169.el5rt.x86_64",
"product_id": "kernel-rt-trace-0:2.6.24.7-169.el5rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace@2.6.24.7-169.el5rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"product": {
"name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"product_id": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@2.6.24.7-169.el5rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"product": {
"name": "kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"product_id": "kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@2.6.24.7-169.el5rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@2.6.24.7-169.el5rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"product_id": "kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@2.6.24.7-169.el5rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.x86_64",
"product": {
"name": "kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.x86_64",
"product_id": "kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@2.6.24.7-169.el5rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.x86_64",
"product": {
"name": "kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.x86_64",
"product_id": "kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-devel@2.6.24.7-169.el5rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:2.6.24.7-169.el5rt.x86_64",
"product": {
"name": "kernel-rt-debug-0:2.6.24.7-169.el5rt.x86_64",
"product_id": "kernel-rt-debug-0:2.6.24.7-169.el5rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@2.6.24.7-169.el5rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.x86_64",
"product_id": "kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common@2.6.24.7-169.el5rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-0:2.6.24.7-169.el5rt.x86_64",
"product": {
"name": "kernel-rt-0:2.6.24.7-169.el5rt.x86_64",
"product_id": "kernel-rt-0:2.6.24.7-169.el5rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-169.el5rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.x86_64",
"product_id": "kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@2.6.24.7-169.el5rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:2.6.24.7-169.el5rt.x86_64",
"product": {
"name": "kernel-rt-devel-0:2.6.24.7-169.el5rt.x86_64",
"product_id": "kernel-rt-devel-0:2.6.24.7-169.el5rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@2.6.24.7-169.el5rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-vanilla-0:2.6.24.7-169.el5rt.x86_64",
"product": {
"name": "kernel-rt-vanilla-0:2.6.24.7-169.el5rt.x86_64",
"product_id": "kernel-rt-vanilla-0:2.6.24.7-169.el5rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-vanilla@2.6.24.7-169.el5rt?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-doc-0:2.6.24.7-169.el5rt.noarch",
"product": {
"name": "kernel-rt-doc-0:2.6.24.7-169.el5rt.noarch",
"product_id": "kernel-rt-doc-0:2.6.24.7-169.el5rt.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-doc@2.6.24.7-169.el5rt?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:2.6.24.7-169.el5rt.src",
"product": {
"name": "kernel-rt-0:2.6.24.7-169.el5rt.src",
"product_id": "kernel-rt-0:2.6.24.7-169.el5rt.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-169.el5rt?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:2.6.24.7-169.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-169.el5rt.i686"
},
"product_reference": "kernel-rt-0:2.6.24.7-169.el5rt.i686",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:2.6.24.7-169.el5rt.src as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-169.el5rt.src"
},
"product_reference": "kernel-rt-0:2.6.24.7-169.el5rt.src",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:2.6.24.7-169.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-169.el5rt.x86_64"
},
"product_reference": "kernel-rt-0:2.6.24.7-169.el5rt.x86_64",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:2.6.24.7-169.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-169.el5rt.i686"
},
"product_reference": "kernel-rt-debug-0:2.6.24.7-169.el5rt.i686",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:2.6.24.7-169.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-169.el5rt.x86_64"
},
"product_reference": "kernel-rt-debug-0:2.6.24.7-169.el5rt.x86_64",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.i686"
},
"product_reference": "kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.i686",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.i686"
},
"product_reference": "kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.i686",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.x86_64",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.i686"
},
"product_reference": "kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.i686",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.i686"
},
"product_reference": "kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.i686",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.x86_64",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:2.6.24.7-169.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-169.el5rt.i686"
},
"product_reference": "kernel-rt-devel-0:2.6.24.7-169.el5rt.i686",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:2.6.24.7-169.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-169.el5rt.x86_64"
},
"product_reference": "kernel-rt-devel-0:2.6.24.7-169.el5rt.x86_64",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-doc-0:2.6.24.7-169.el5rt.noarch as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-169.el5rt.noarch"
},
"product_reference": "kernel-rt-doc-0:2.6.24.7-169.el5rt.noarch",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-0:2.6.24.7-169.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-169.el5rt.i686"
},
"product_reference": "kernel-rt-trace-0:2.6.24.7-169.el5rt.i686",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-0:2.6.24.7-169.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-169.el5rt.x86_64"
},
"product_reference": "kernel-rt-trace-0:2.6.24.7-169.el5rt.x86_64",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.i686"
},
"product_reference": "kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.i686",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.x86_64"
},
"product_reference": "kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.i686"
},
"product_reference": "kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.i686",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.x86_64"
},
"product_reference": "kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.x86_64",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vanilla-0:2.6.24.7-169.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-169.el5rt.i686"
},
"product_reference": "kernel-rt-vanilla-0:2.6.24.7-169.el5rt.i686",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vanilla-0:2.6.24.7-169.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-169.el5rt.x86_64"
},
"product_reference": "kernel-rt-vanilla-0:2.6.24.7-169.el5rt.x86_64",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.i686"
},
"product_reference": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.i686",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.x86_64"
},
"product_reference": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.i686"
},
"product_reference": "kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.i686",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.x86_64"
},
"product_reference": "kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.x86_64",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Tavis Ormandy"
]
}
],
"cve": "CVE-2010-3067",
"discovery_date": "2010-09-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "629441"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in the do_io_submit function in fs/aio.c in the Linux kernel before 2.6.36-rc4-next-20100915 allows local users to cause a denial of service or possibly have unspecified other impact via crafted use of the io_submit system call.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: do_io_submit() infoleak",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-169.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-169.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2010-3067"
},
{
"category": "external",
"summary": "RHBZ#629441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=629441"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2010-3067",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3067"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3067",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3067"
}
],
"release_date": "2010-09-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-10-08T02:08:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-169.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-169.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0758"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-169.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-169.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: do_io_submit() infoleak"
},
{
"acknowledgments": [
{
"names": [
"Ben Hawkes"
]
}
],
"cve": "CVE-2010-3081",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2010-09-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "634457"
}
],
"notes": [
{
"category": "description",
"text": "The compat_alloc_user_space functions in include/asm/compat.h files in the Linux kernel before 2.6.36-rc4-git2 on 64-bit platforms do not properly allocate the userspace memory required for the 32-bit compatibility layer, which allows local users to gain privileges by leveraging the ability of the compat_mc_getsockopt function (aka the MCAST_MSFILTER getsockopt support) to control a certain length value, related to a \"stack pointer underflow\" issue, as exploited in the wild in September 2010.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: 64-bit Compatibility Mode Stack Pointer Underflow",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "More information can be found in this kbase: https://access.redhat.com/kb/docs/DOC-40265.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-169.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-169.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2010-3081"
},
{
"category": "external",
"summary": "RHBZ#634457",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=634457"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2010-3081",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3081"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3081",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3081"
}
],
"release_date": "2010-09-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-10-08T02:08:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-169.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-169.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0758"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"products": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-169.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-169.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: 64-bit Compatibility Mode Stack Pointer Underflow"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.