rhsa-2006_0101
Vulnerability from csaf_redhat
Published
2006-01-17 08:36
Modified
2024-11-22 00:09
Summary
Red Hat Security Advisory: kernel security update
Notes
Topic
Updated kernel packages that fix several security issues in the Red Hat
Enterprise Linux 4 kernel are now available.
This security advisory has been rated as having important security impact
by the Red Hat Security Response Team.
Details
The Linux kernel handles the basic functions of the operating system.
These new kernel packages contain fixes for the security issues
described below:
- a flaw in network IGMP processing that a allowed a remote user on the
local network to cause a denial of service (disabling of multicast reports)
if the system is running multicast applications (CVE-2002-2185, moderate)
- a flaw which allowed a local user to write to firmware on read-only
opened /dev/cdrom devices (CVE-2004-1190, moderate)
- a flaw in gzip/zlib handling internal to the kernel that may allow a
local user to cause a denial of service (crash) (CVE-2005-2458, low)
- a flaw in procfs handling during unloading of modules that allowed a
local user to cause a denial of service or potentially gain privileges
(CVE-2005-2709, moderate)
- a flaw in the SCSI procfs interface that allowed a local user to cause a
denial of service (crash) (CVE-2005-2800, moderate)
- a flaw in 32-bit-compat handling of the TIOCGDEV ioctl that allowed
a local user to cause a denial of service (crash) (CVE-2005-3044, important)
- a race condition when threads share memory mapping that allowed local
users to cause a denial of service (deadlock) (CVE-2005-3106, important)
- a flaw when trying to mount a non-hfsplus filesystem using hfsplus that
allowed local users to cause a denial of service (crash) (CVE-2005-3109,
moderate)
- a minor info leak with the get_thread_area() syscall that allowed
a local user to view uninitialized kernel stack data (CVE-2005-3276, low)
- a flaw in mq_open system call that allowed a local user to cause a denial
of service (crash) (CVE-2005-3356, important)
- a flaw in set_mempolicy that allowed a local user on some 64-bit
architectures to cause a denial of service (crash) (CVE-2005-3358, important)
- a flaw in the auto-reap of child processes that allowed a local user to
cause a denial of service (crash) (CVE-2005-3784, important)
- a flaw in the IPv6 flowlabel code that allowed a local user to cause a
denial of service (crash) (CVE-2005-3806, important)
- a flaw in network ICMP processing that allowed a local user to cause
a denial of service (memory exhaustion) (CVE-2005-3848, important)
- a flaw in file lease time-out handling that allowed a local user to cause
a denial of service (log file overflow) (CVE-2005-3857, moderate)
- a flaw in network IPv6 xfrm handling that allowed a local user to
cause a denial of service (memory exhaustion) (CVE-2005-3858, important)
- a flaw in procfs handling that allowed a local user to read kernel memory
(CVE-2005-4605, important)
All Red Hat Enterprise Linux 4 users are advised to upgrade their kernels
to the packages associated with their machine architectures and
configurations as listed in this erratum.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated kernel packages that fix several security issues in the Red Hat\nEnterprise Linux 4 kernel are now available. \n\nThis security advisory has been rated as having important security impact\nby the Red Hat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "The Linux kernel handles the basic functions of the operating system.\n\nThese new kernel packages contain fixes for the security issues\ndescribed below:\n\n- a flaw in network IGMP processing that a allowed a remote user on the\nlocal network to cause a denial of service (disabling of multicast reports)\nif the system is running multicast applications (CVE-2002-2185, moderate)\n\n- a flaw which allowed a local user to write to firmware on read-only\nopened /dev/cdrom devices (CVE-2004-1190, moderate) \n\n- a flaw in gzip/zlib handling internal to the kernel that may allow a\nlocal user to cause a denial of service (crash) (CVE-2005-2458, low) \n\n- a flaw in procfs handling during unloading of modules that allowed a\nlocal user to cause a denial of service or potentially gain privileges\n(CVE-2005-2709, moderate)\n\n- a flaw in the SCSI procfs interface that allowed a local user to cause a\ndenial of service (crash) (CVE-2005-2800, moderate)\n\n- a flaw in 32-bit-compat handling of the TIOCGDEV ioctl that allowed\na local user to cause a denial of service (crash) (CVE-2005-3044, important)\n\n- a race condition when threads share memory mapping that allowed local\nusers to cause a denial of service (deadlock) (CVE-2005-3106, important)\n\n- a flaw when trying to mount a non-hfsplus filesystem using hfsplus that\nallowed local users to cause a denial of service (crash) (CVE-2005-3109,\nmoderate)\n\n- a minor info leak with the get_thread_area() syscall that allowed\na local user to view uninitialized kernel stack data (CVE-2005-3276, low) \n\n- a flaw in mq_open system call that allowed a local user to cause a denial\nof service (crash) (CVE-2005-3356, important)\n\n- a flaw in set_mempolicy that allowed a local user on some 64-bit\narchitectures to cause a denial of service (crash) (CVE-2005-3358, important)\n\n- a flaw in the auto-reap of child processes that allowed a local user to\ncause a denial of service (crash) (CVE-2005-3784, important)\n\n- a flaw in the IPv6 flowlabel code that allowed a local user to cause a\ndenial of service (crash) (CVE-2005-3806, important)\n\n- a flaw in network ICMP processing that allowed a local user to cause\na denial of service (memory exhaustion) (CVE-2005-3848, important)\n\n- a flaw in file lease time-out handling that allowed a local user to cause\na denial of service (log file overflow) (CVE-2005-3857, moderate) \n\n- a flaw in network IPv6 xfrm handling that allowed a local user to\ncause a denial of service (memory exhaustion) (CVE-2005-3858, important) \n\n- a flaw in procfs handling that allowed a local user to read kernel memory\n(CVE-2005-4605, important)\n\nAll Red Hat Enterprise Linux 4 users are advised to upgrade their kernels\nto the packages associated with their machine architectures and\nconfigurations as listed in this erratum.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2006:0101",
"url": "https://access.redhat.com/errata/RHSA-2006:0101"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "158861",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=158861"
},
{
"category": "external",
"summary": "165679",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=165679"
},
{
"category": "external",
"summary": "167696",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=167696"
},
{
"category": "external",
"summary": "168659",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=168659"
},
{
"category": "external",
"summary": "168777",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=168777"
},
{
"category": "external",
"summary": "168924",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=168924"
},
{
"category": "external",
"summary": "169130",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=169130"
},
{
"category": "external",
"summary": "170262",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=170262"
},
{
"category": "external",
"summary": "171002",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=171002"
},
{
"category": "external",
"summary": "174078",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=174078"
},
{
"category": "external",
"summary": "174081",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=174081"
},
{
"category": "external",
"summary": "174337",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=174337"
},
{
"category": "external",
"summary": "174343",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=174343"
},
{
"category": "external",
"summary": "174345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=174345"
},
{
"category": "external",
"summary": "174807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=174807"
},
{
"category": "external",
"summary": "175683",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=175683"
},
{
"category": "external",
"summary": "176812",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=176812"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2006/rhsa-2006_0101.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2024-11-22T00:09:31+00:00",
"generator": {
"date": "2024-11-22T00:09:31+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2006:0101",
"initial_release_date": "2006-01-17T08:36:00+00:00",
"revision_history": [
{
"date": "2006-01-17T08:36:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2006-01-17T00:00:00+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T00:09:31+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4",
"product": {
"name": "Red Hat Enterprise Linux AS version 4",
"product_id": "4AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop version 4",
"product": {
"name": "Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4",
"product": {
"name": "Red Hat Enterprise Linux ES version 4",
"product_id": "4ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4",
"product": {
"name": "Red Hat Enterprise Linux WS version 4",
"product_id": "4WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"product": {
"name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"product_id": "kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-22.0.2.EL?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-smp-0:2.6.9-22.0.2.EL.i686",
"product": {
"name": "kernel-smp-0:2.6.9-22.0.2.EL.i686",
"product_id": "kernel-smp-0:2.6.9-22.0.2.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-smp@2.6.9-22.0.2.EL?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"product": {
"name": "kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"product_id": "kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-hugemem@2.6.9-22.0.2.EL?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"product": {
"name": "kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"product_id": "kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-hugemem-devel@2.6.9-22.0.2.EL?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"product": {
"name": "kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"product_id": "kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-22.0.2.EL?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.9-22.0.2.EL.i686",
"product": {
"name": "kernel-0:2.6.9-22.0.2.EL.i686",
"product_id": "kernel-0:2.6.9-22.0.2.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-22.0.2.EL?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.9-22.0.2.EL.i686",
"product": {
"name": "kernel-devel-0:2.6.9-22.0.2.EL.i686",
"product_id": "kernel-devel-0:2.6.9-22.0.2.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.9-22.0.2.EL?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"product": {
"name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"product_id": "kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-22.0.2.EL?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.9-22.0.2.EL.ia64",
"product": {
"name": "kernel-0:2.6.9-22.0.2.EL.ia64",
"product_id": "kernel-0:2.6.9-22.0.2.EL.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-22.0.2.EL?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"product": {
"name": "kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"product_id": "kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.9-22.0.2.EL?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"product_id": "kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-22.0.2.EL?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"product": {
"name": "kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"product_id": "kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-smp@2.6.9-22.0.2.EL?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"product": {
"name": "kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"product_id": "kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-22.0.2.EL?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.9-22.0.2.EL.x86_64",
"product": {
"name": "kernel-0:2.6.9-22.0.2.EL.x86_64",
"product_id": "kernel-0:2.6.9-22.0.2.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-22.0.2.EL?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"product": {
"name": "kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"product_id": "kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.9-22.0.2.EL?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"product": {
"name": "kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"product_id": "kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.9-22.0.2.EL?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.9-22.0.2.EL.src",
"product": {
"name": "kernel-0:2.6.9-22.0.2.EL.src",
"product_id": "kernel-0:2.6.9-22.0.2.EL.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-22.0.2.EL?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"product": {
"name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"product_id": "kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-22.0.2.EL?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.9-22.0.2.EL.ppc64",
"product": {
"name": "kernel-0:2.6.9-22.0.2.EL.ppc64",
"product_id": "kernel-0:2.6.9-22.0.2.EL.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-22.0.2.EL?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"product": {
"name": "kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"product_id": "kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.9-22.0.2.EL?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"product": {
"name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"product_id": "kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-22.0.2.EL?arch=ppc64iseries"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"product": {
"name": "kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"product_id": "kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-22.0.2.EL?arch=ppc64iseries"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"product": {
"name": "kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"product_id": "kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.9-22.0.2.EL?arch=ppc64iseries"
}
}
}
],
"category": "architecture",
"name": "ppc64iseries"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"product": {
"name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"product_id": "kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-22.0.2.EL?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.9-22.0.2.EL.s390x",
"product": {
"name": "kernel-0:2.6.9-22.0.2.EL.s390x",
"product_id": "kernel-0:2.6.9-22.0.2.EL.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-22.0.2.EL?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"product": {
"name": "kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"product_id": "kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.9-22.0.2.EL?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"product": {
"name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"product_id": "kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-22.0.2.EL?arch=s390"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.9-22.0.2.EL.s390",
"product": {
"name": "kernel-0:2.6.9-22.0.2.EL.s390",
"product_id": "kernel-0:2.6.9-22.0.2.EL.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-22.0.2.EL?arch=s390"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.9-22.0.2.EL.s390",
"product": {
"name": "kernel-devel-0:2.6.9-22.0.2.EL.s390",
"product_id": "kernel-devel-0:2.6.9-22.0.2.EL.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.9-22.0.2.EL?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-22.0.2.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-0:2.6.9-22.0.2.EL.i686"
},
"product_reference": "kernel-0:2.6.9-22.0.2.EL.i686",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-22.0.2.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-0:2.6.9-22.0.2.EL.ia64"
},
"product_reference": "kernel-0:2.6.9-22.0.2.EL.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-22.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-0:2.6.9-22.0.2.EL.ppc64"
},
"product_reference": "kernel-0:2.6.9-22.0.2.EL.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-22.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries"
},
"product_reference": "kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-22.0.2.EL.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-0:2.6.9-22.0.2.EL.s390"
},
"product_reference": "kernel-0:2.6.9-22.0.2.EL.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-22.0.2.EL.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-0:2.6.9-22.0.2.EL.s390x"
},
"product_reference": "kernel-0:2.6.9-22.0.2.EL.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-22.0.2.EL.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-0:2.6.9-22.0.2.EL.src"
},
"product_reference": "kernel-0:2.6.9-22.0.2.EL.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-22.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-0:2.6.9-22.0.2.EL.x86_64"
},
"product_reference": "kernel-0:2.6.9-22.0.2.EL.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries"
},
"product_reference": "kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390"
},
"product_reference": "kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-22.0.2.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-devel-0:2.6.9-22.0.2.EL.i686"
},
"product_reference": "kernel-devel-0:2.6.9-22.0.2.EL.i686",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-22.0.2.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ia64"
},
"product_reference": "kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-22.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64"
},
"product_reference": "kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries"
},
"product_reference": "kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-22.0.2.EL.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390"
},
"product_reference": "kernel-devel-0:2.6.9-22.0.2.EL.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-22.0.2.EL.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390x"
},
"product_reference": "kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-22.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64"
},
"product_reference": "kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.9-22.0.2.EL.noarch as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-doc-0:2.6.9-22.0.2.EL.noarch"
},
"product_reference": "kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-hugemem-0:2.6.9-22.0.2.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686"
},
"product_reference": "kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686"
},
"product_reference": "kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-0:2.6.9-22.0.2.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-smp-0:2.6.9-22.0.2.EL.i686"
},
"product_reference": "kernel-smp-0:2.6.9-22.0.2.EL.i686",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-0:2.6.9-22.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64"
},
"product_reference": "kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-devel-0:2.6.9-22.0.2.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686"
},
"product_reference": "kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64"
},
"product_reference": "kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-22.0.2.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-0:2.6.9-22.0.2.EL.i686"
},
"product_reference": "kernel-0:2.6.9-22.0.2.EL.i686",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-22.0.2.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-0:2.6.9-22.0.2.EL.ia64"
},
"product_reference": "kernel-0:2.6.9-22.0.2.EL.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-22.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64"
},
"product_reference": "kernel-0:2.6.9-22.0.2.EL.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-22.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64iseries"
},
"product_reference": "kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-22.0.2.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-0:2.6.9-22.0.2.EL.s390"
},
"product_reference": "kernel-0:2.6.9-22.0.2.EL.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-22.0.2.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-0:2.6.9-22.0.2.EL.s390x"
},
"product_reference": "kernel-0:2.6.9-22.0.2.EL.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-22.0.2.EL.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-0:2.6.9-22.0.2.EL.src"
},
"product_reference": "kernel-0:2.6.9-22.0.2.EL.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-22.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-0:2.6.9-22.0.2.EL.x86_64"
},
"product_reference": "kernel-0:2.6.9-22.0.2.EL.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries"
},
"product_reference": "kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390"
},
"product_reference": "kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-22.0.2.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.i686"
},
"product_reference": "kernel-devel-0:2.6.9-22.0.2.EL.i686",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-22.0.2.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ia64"
},
"product_reference": "kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-22.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64"
},
"product_reference": "kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries"
},
"product_reference": "kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-22.0.2.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390"
},
"product_reference": "kernel-devel-0:2.6.9-22.0.2.EL.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-22.0.2.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390x"
},
"product_reference": "kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-22.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.x86_64"
},
"product_reference": "kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.9-22.0.2.EL.noarch as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-doc-0:2.6.9-22.0.2.EL.noarch"
},
"product_reference": "kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-hugemem-0:2.6.9-22.0.2.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-hugemem-0:2.6.9-22.0.2.EL.i686"
},
"product_reference": "kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686"
},
"product_reference": "kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-0:2.6.9-22.0.2.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.i686"
},
"product_reference": "kernel-smp-0:2.6.9-22.0.2.EL.i686",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-0:2.6.9-22.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.x86_64"
},
"product_reference": "kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-devel-0:2.6.9-22.0.2.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686"
},
"product_reference": "kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64"
},
"product_reference": "kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-22.0.2.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-0:2.6.9-22.0.2.EL.i686"
},
"product_reference": "kernel-0:2.6.9-22.0.2.EL.i686",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-22.0.2.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-0:2.6.9-22.0.2.EL.ia64"
},
"product_reference": "kernel-0:2.6.9-22.0.2.EL.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-22.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-0:2.6.9-22.0.2.EL.ppc64"
},
"product_reference": "kernel-0:2.6.9-22.0.2.EL.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-22.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-0:2.6.9-22.0.2.EL.ppc64iseries"
},
"product_reference": "kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-22.0.2.EL.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-0:2.6.9-22.0.2.EL.s390"
},
"product_reference": "kernel-0:2.6.9-22.0.2.EL.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-22.0.2.EL.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-0:2.6.9-22.0.2.EL.s390x"
},
"product_reference": "kernel-0:2.6.9-22.0.2.EL.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-22.0.2.EL.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-0:2.6.9-22.0.2.EL.src"
},
"product_reference": "kernel-0:2.6.9-22.0.2.EL.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-22.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-0:2.6.9-22.0.2.EL.x86_64"
},
"product_reference": "kernel-0:2.6.9-22.0.2.EL.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries"
},
"product_reference": "kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390"
},
"product_reference": "kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-22.0.2.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-devel-0:2.6.9-22.0.2.EL.i686"
},
"product_reference": "kernel-devel-0:2.6.9-22.0.2.EL.i686",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-22.0.2.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ia64"
},
"product_reference": "kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-22.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64"
},
"product_reference": "kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries"
},
"product_reference": "kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-22.0.2.EL.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390"
},
"product_reference": "kernel-devel-0:2.6.9-22.0.2.EL.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-22.0.2.EL.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390x"
},
"product_reference": "kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-22.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-devel-0:2.6.9-22.0.2.EL.x86_64"
},
"product_reference": "kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.9-22.0.2.EL.noarch as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-doc-0:2.6.9-22.0.2.EL.noarch"
},
"product_reference": "kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-hugemem-0:2.6.9-22.0.2.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-hugemem-0:2.6.9-22.0.2.EL.i686"
},
"product_reference": "kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686"
},
"product_reference": "kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-0:2.6.9-22.0.2.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-smp-0:2.6.9-22.0.2.EL.i686"
},
"product_reference": "kernel-smp-0:2.6.9-22.0.2.EL.i686",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-0:2.6.9-22.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-smp-0:2.6.9-22.0.2.EL.x86_64"
},
"product_reference": "kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-devel-0:2.6.9-22.0.2.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686"
},
"product_reference": "kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64"
},
"product_reference": "kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-22.0.2.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-0:2.6.9-22.0.2.EL.i686"
},
"product_reference": "kernel-0:2.6.9-22.0.2.EL.i686",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-22.0.2.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-0:2.6.9-22.0.2.EL.ia64"
},
"product_reference": "kernel-0:2.6.9-22.0.2.EL.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-22.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-0:2.6.9-22.0.2.EL.ppc64"
},
"product_reference": "kernel-0:2.6.9-22.0.2.EL.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-22.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries"
},
"product_reference": "kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-22.0.2.EL.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-0:2.6.9-22.0.2.EL.s390"
},
"product_reference": "kernel-0:2.6.9-22.0.2.EL.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-22.0.2.EL.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-0:2.6.9-22.0.2.EL.s390x"
},
"product_reference": "kernel-0:2.6.9-22.0.2.EL.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-22.0.2.EL.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-0:2.6.9-22.0.2.EL.src"
},
"product_reference": "kernel-0:2.6.9-22.0.2.EL.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-22.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-0:2.6.9-22.0.2.EL.x86_64"
},
"product_reference": "kernel-0:2.6.9-22.0.2.EL.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries"
},
"product_reference": "kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390"
},
"product_reference": "kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-22.0.2.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-devel-0:2.6.9-22.0.2.EL.i686"
},
"product_reference": "kernel-devel-0:2.6.9-22.0.2.EL.i686",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-22.0.2.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ia64"
},
"product_reference": "kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-22.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64"
},
"product_reference": "kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries"
},
"product_reference": "kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-22.0.2.EL.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390"
},
"product_reference": "kernel-devel-0:2.6.9-22.0.2.EL.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-22.0.2.EL.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390x"
},
"product_reference": "kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-22.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64"
},
"product_reference": "kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.9-22.0.2.EL.noarch as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-doc-0:2.6.9-22.0.2.EL.noarch"
},
"product_reference": "kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-hugemem-0:2.6.9-22.0.2.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686"
},
"product_reference": "kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686"
},
"product_reference": "kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-0:2.6.9-22.0.2.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-smp-0:2.6.9-22.0.2.EL.i686"
},
"product_reference": "kernel-smp-0:2.6.9-22.0.2.EL.i686",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-0:2.6.9-22.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64"
},
"product_reference": "kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-devel-0:2.6.9-22.0.2.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686"
},
"product_reference": "kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64"
},
"product_reference": "kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"relates_to_product_reference": "4WS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2002-2185",
"discovery_date": "2005-12-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1616930"
}
],
"notes": [
{
"category": "description",
"text": "The Internet Group Management Protocol (IGMP) allows local users to cause a denial of service via an IGMP membership report to a target\u0027s Ethernet address instead of the Multicast group address, which causes the target to stop sending reports to the router and effectively disconnect the group from the network.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:kernel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-0:2.6.9-22.0.2.EL.src",
"4AS:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.src",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-0:2.6.9-22.0.2.EL.src",
"4ES:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-0:2.6.9-22.0.2.EL.src",
"4WS:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2002-2185"
},
{
"category": "external",
"summary": "RHBZ#1616930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616930"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2002-2185",
"url": "https://www.cve.org/CVERecord?id=CVE-2002-2185"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-2185",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2002-2185"
}
],
"release_date": "2002-06-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-01-17T08:36:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/",
"product_ids": [
"4AS:kernel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-0:2.6.9-22.0.2.EL.src",
"4AS:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.src",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-0:2.6.9-22.0.2.EL.src",
"4ES:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-0:2.6.9-22.0.2.EL.src",
"4WS:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0101"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2004-1190",
"discovery_date": "2004-08-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1617395"
}
],
"notes": [
{
"category": "description",
"text": "SUSE Linux before 9.1 and SUSE Linux Enterprise Server before 9 do not properly check commands sent to CD devices that have been opened read-only, which could allow local users to conduct unauthorized write activities to modify the firmware of associated SCSI devices.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:kernel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-0:2.6.9-22.0.2.EL.src",
"4AS:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.src",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-0:2.6.9-22.0.2.EL.src",
"4ES:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-0:2.6.9-22.0.2.EL.src",
"4WS:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2004-1190"
},
{
"category": "external",
"summary": "RHBZ#1617395",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617395"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2004-1190",
"url": "https://www.cve.org/CVERecord?id=CVE-2004-1190"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1190",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1190"
}
],
"release_date": "2004-07-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-01-17T08:36:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/",
"product_ids": [
"4AS:kernel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-0:2.6.9-22.0.2.EL.src",
"4AS:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.src",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-0:2.6.9-22.0.2.EL.src",
"4ES:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-0:2.6.9-22.0.2.EL.src",
"4WS:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0101"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2005-2458",
"discovery_date": "2005-08-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1617720"
}
],
"notes": [
{
"category": "description",
"text": "inflate.c in the zlib routines in the Linux kernel before 2.6.12.5 allows remote attackers to cause a denial of service (kernel crash) via a compressed file with \"improper tables\".",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:kernel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-0:2.6.9-22.0.2.EL.src",
"4AS:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.src",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-0:2.6.9-22.0.2.EL.src",
"4ES:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-0:2.6.9-22.0.2.EL.src",
"4WS:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2005-2458"
},
{
"category": "external",
"summary": "RHBZ#1617720",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617720"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2005-2458",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-2458"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2458",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2458"
}
],
"release_date": "1999-06-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-01-17T08:36:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/",
"product_ids": [
"4AS:kernel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-0:2.6.9-22.0.2.EL.src",
"4AS:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.src",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-0:2.6.9-22.0.2.EL.src",
"4ES:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-0:2.6.9-22.0.2.EL.src",
"4WS:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0101"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2005-2709",
"discovery_date": "2005-09-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1617751"
}
],
"notes": [
{
"category": "description",
"text": "The sysctl functionality (sysctl.c) in Linux kernel before 2.6.14.1 allows local users to cause a denial of service (kernel oops) and possibly execute code by opening an interface file in /proc/sys/net/ipv4/conf/, waiting until the interface is unregistered, then obtaining and modifying function pointers in memory that was used for the ctl_table.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:kernel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-0:2.6.9-22.0.2.EL.src",
"4AS:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.src",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-0:2.6.9-22.0.2.EL.src",
"4ES:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-0:2.6.9-22.0.2.EL.src",
"4WS:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2005-2709"
},
{
"category": "external",
"summary": "RHBZ#1617751",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617751"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2005-2709",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-2709"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2709",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2709"
}
],
"release_date": "2005-11-08T14:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-01-17T08:36:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/",
"product_ids": [
"4AS:kernel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-0:2.6.9-22.0.2.EL.src",
"4AS:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.src",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-0:2.6.9-22.0.2.EL.src",
"4ES:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-0:2.6.9-22.0.2.EL.src",
"4WS:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0101"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2005-2800",
"discovery_date": "2005-08-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1617758"
}
],
"notes": [
{
"category": "description",
"text": "Memory leak in the seq_file implementation in the SCSI procfs interface (sg.c) in Linux kernel 2.6.13 and earlier allows local users to cause a denial of service (memory consumption) via certain repeated reads from the /proc/scsi/sg/devices file, which is not properly handled when the next() iterator returns NULL or an error.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:kernel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-0:2.6.9-22.0.2.EL.src",
"4AS:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.src",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-0:2.6.9-22.0.2.EL.src",
"4ES:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-0:2.6.9-22.0.2.EL.src",
"4WS:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2005-2800"
},
{
"category": "external",
"summary": "RHBZ#1617758",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617758"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2005-2800",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-2800"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2800",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2800"
}
],
"release_date": "2005-08-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-01-17T08:36:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/",
"product_ids": [
"4AS:kernel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-0:2.6.9-22.0.2.EL.src",
"4AS:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.src",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-0:2.6.9-22.0.2.EL.src",
"4ES:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-0:2.6.9-22.0.2.EL.src",
"4WS:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0101"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2005-3044",
"discovery_date": "2005-09-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1617776"
}
],
"notes": [
{
"category": "description",
"text": "Multiple vulnerabilities in Linux kernel before 2.6.13.2 allow local users to cause a denial of service (kernel OOPS from null dereference) via (1) fput in a 32-bit ioctl on 64-bit x86 systems or (2) sockfd_put in the 32-bit routing_ioctl function on 64-bit systems.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:kernel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-0:2.6.9-22.0.2.EL.src",
"4AS:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.src",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-0:2.6.9-22.0.2.EL.src",
"4ES:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-0:2.6.9-22.0.2.EL.src",
"4WS:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2005-3044"
},
{
"category": "external",
"summary": "RHBZ#1617776",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617776"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2005-3044",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-3044"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-3044",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3044"
}
],
"release_date": "2005-09-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-01-17T08:36:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/",
"product_ids": [
"4AS:kernel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-0:2.6.9-22.0.2.EL.src",
"4AS:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.src",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-0:2.6.9-22.0.2.EL.src",
"4ES:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-0:2.6.9-22.0.2.EL.src",
"4WS:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0101"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2005-3106",
"discovery_date": "2005-01-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1617782"
}
],
"notes": [
{
"category": "description",
"text": "Race condition in Linux 2.6, when threads are sharing memory mapping via CLONE_VM (such as linuxthreads and vfork), might allow local users to cause a denial of service (deadlock) by triggering a core dump while waiting for a thread that has just performed an exec.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:kernel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-0:2.6.9-22.0.2.EL.src",
"4AS:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.src",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-0:2.6.9-22.0.2.EL.src",
"4ES:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-0:2.6.9-22.0.2.EL.src",
"4WS:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2005-3106"
},
{
"category": "external",
"summary": "RHBZ#1617782",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617782"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2005-3106",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-3106"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-3106",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3106"
}
],
"release_date": "2005-01-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-01-17T08:36:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/",
"product_ids": [
"4AS:kernel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-0:2.6.9-22.0.2.EL.src",
"4AS:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.src",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-0:2.6.9-22.0.2.EL.src",
"4ES:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-0:2.6.9-22.0.2.EL.src",
"4WS:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0101"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2005-3109",
"discovery_date": "2005-05-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1617786"
}
],
"notes": [
{
"category": "description",
"text": "The HFS and HFS+ (hfsplus) modules in Linux 2.6 allow attackers to cause a denial of service (oops) by using hfsplus to mount a filesystem that is not hfsplus.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:kernel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-0:2.6.9-22.0.2.EL.src",
"4AS:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.src",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-0:2.6.9-22.0.2.EL.src",
"4ES:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-0:2.6.9-22.0.2.EL.src",
"4WS:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2005-3109"
},
{
"category": "external",
"summary": "RHBZ#1617786",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617786"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2005-3109",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-3109"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-3109",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3109"
}
],
"release_date": "2005-05-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-01-17T08:36:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/",
"product_ids": [
"4AS:kernel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-0:2.6.9-22.0.2.EL.src",
"4AS:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.src",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-0:2.6.9-22.0.2.EL.src",
"4ES:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-0:2.6.9-22.0.2.EL.src",
"4WS:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0101"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2005-3276",
"discovery_date": "2005-07-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1617813"
}
],
"notes": [
{
"category": "description",
"text": "The sys_get_thread_area function in process.c in Linux 2.6 before 2.6.12.4 and 2.6.13 does not clear a data structure before copying it to userspace, which might allow a user process to obtain sensitive information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:kernel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-0:2.6.9-22.0.2.EL.src",
"4AS:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.src",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-0:2.6.9-22.0.2.EL.src",
"4ES:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-0:2.6.9-22.0.2.EL.src",
"4WS:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2005-3276"
},
{
"category": "external",
"summary": "RHBZ#1617813",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617813"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2005-3276",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-3276"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-3276",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3276"
}
],
"release_date": "2005-07-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-01-17T08:36:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/",
"product_ids": [
"4AS:kernel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-0:2.6.9-22.0.2.EL.src",
"4AS:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.src",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-0:2.6.9-22.0.2.EL.src",
"4ES:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-0:2.6.9-22.0.2.EL.src",
"4WS:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0101"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2005-3356",
"discovery_date": "2005-09-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1617817"
}
],
"notes": [
{
"category": "description",
"text": "The mq_open system call in Linux kernel 2.6.9, in certain situations, can decrement a counter twice (\"double decrement\") as a result of multiple calls to the mntput function when the dentry_open function call fails, which allows local users to cause a denial of service (panic) via unspecified attack vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:kernel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-0:2.6.9-22.0.2.EL.src",
"4AS:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.src",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-0:2.6.9-22.0.2.EL.src",
"4ES:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-0:2.6.9-22.0.2.EL.src",
"4WS:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2005-3356"
},
{
"category": "external",
"summary": "RHBZ#1617817",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617817"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2005-3356",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-3356"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-3356",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3356"
}
],
"release_date": "2006-01-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-01-17T08:36:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/",
"product_ids": [
"4AS:kernel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-0:2.6.9-22.0.2.EL.src",
"4AS:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.src",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-0:2.6.9-22.0.2.EL.src",
"4ES:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-0:2.6.9-22.0.2.EL.src",
"4WS:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0101"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2005-3358",
"discovery_date": "2005-12-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1617819"
}
],
"notes": [
{
"category": "description",
"text": "Linux kernel before 2.6.15 allows local users to cause a denial of service (panic) via a set_mempolicy call with a 0 bitmask, which causes a panic when a page fault occurs.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:kernel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-0:2.6.9-22.0.2.EL.src",
"4AS:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.src",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-0:2.6.9-22.0.2.EL.src",
"4ES:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-0:2.6.9-22.0.2.EL.src",
"4WS:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2005-3358"
},
{
"category": "external",
"summary": "RHBZ#1617819",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617819"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2005-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-3358"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-3358",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3358"
}
],
"release_date": "2005-12-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-01-17T08:36:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/",
"product_ids": [
"4AS:kernel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-0:2.6.9-22.0.2.EL.src",
"4AS:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.src",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-0:2.6.9-22.0.2.EL.src",
"4ES:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-0:2.6.9-22.0.2.EL.src",
"4WS:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0101"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2005-3784",
"discovery_date": "2005-11-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1617839"
}
],
"notes": [
{
"category": "description",
"text": "The auto-reap of child processes in Linux kernel 2.6 before 2.6.15 includes processes with ptrace attached, which leads to a dangling ptrace reference and allows local users to cause a denial of service (crash) and gain root privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:kernel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-0:2.6.9-22.0.2.EL.src",
"4AS:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.src",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-0:2.6.9-22.0.2.EL.src",
"4ES:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-0:2.6.9-22.0.2.EL.src",
"4WS:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2005-3784"
},
{
"category": "external",
"summary": "RHBZ#1617839",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617839"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2005-3784",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-3784"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-3784",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3784"
}
],
"release_date": "2005-11-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-01-17T08:36:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/",
"product_ids": [
"4AS:kernel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-0:2.6.9-22.0.2.EL.src",
"4AS:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.src",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-0:2.6.9-22.0.2.EL.src",
"4ES:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-0:2.6.9-22.0.2.EL.src",
"4WS:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0101"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2005-3806",
"discovery_date": "2005-11-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1617840"
}
],
"notes": [
{
"category": "description",
"text": "The IPv6 flow label handling code (ip6_flowlabel.c) in Linux kernels 2.4 up to 2.4.32 and 2.6 before 2.6.14 modifies the wrong variable in certain circumstances, which allows local users to corrupt kernel memory or cause a denial of service (crash) by triggering a free of non-allocated memory.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:kernel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-0:2.6.9-22.0.2.EL.src",
"4AS:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.src",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-0:2.6.9-22.0.2.EL.src",
"4ES:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-0:2.6.9-22.0.2.EL.src",
"4WS:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2005-3806"
},
{
"category": "external",
"summary": "RHBZ#1617840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617840"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2005-3806",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-3806"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-3806",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3806"
}
],
"release_date": "2005-10-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-01-17T08:36:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/",
"product_ids": [
"4AS:kernel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-0:2.6.9-22.0.2.EL.src",
"4AS:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.src",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-0:2.6.9-22.0.2.EL.src",
"4ES:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-0:2.6.9-22.0.2.EL.src",
"4WS:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0101"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2005-3848",
"discovery_date": "2005-11-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1617841"
}
],
"notes": [
{
"category": "description",
"text": "Memory leak in the icmp_push_reply function in Linux 2.6 before 2.6.12.6 and 2.6.13 allows remote attackers to cause a denial of service (memory consumption) via a large number of crafted packets that cause the ip_append_data function to fail, aka \"DST leak in icmp_push_reply.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:kernel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-0:2.6.9-22.0.2.EL.src",
"4AS:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.src",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-0:2.6.9-22.0.2.EL.src",
"4ES:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-0:2.6.9-22.0.2.EL.src",
"4WS:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2005-3848"
},
{
"category": "external",
"summary": "RHBZ#1617841",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617841"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2005-3848",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-3848"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-3848",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3848"
}
],
"release_date": "2005-08-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-01-17T08:36:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/",
"product_ids": [
"4AS:kernel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-0:2.6.9-22.0.2.EL.src",
"4AS:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.src",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-0:2.6.9-22.0.2.EL.src",
"4ES:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-0:2.6.9-22.0.2.EL.src",
"4WS:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0101"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2005-3857",
"discovery_date": "2005-11-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1617842"
}
],
"notes": [
{
"category": "description",
"text": "The time_out_leases function in locks.c for Linux kernel before 2.6.15-rc3 allows local users to cause a denial of service (kernel log message consumption) by causing a large number of broken leases, which is recorded to the log using the printk function.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:kernel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-0:2.6.9-22.0.2.EL.src",
"4AS:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.src",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-0:2.6.9-22.0.2.EL.src",
"4ES:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-0:2.6.9-22.0.2.EL.src",
"4WS:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2005-3857"
},
{
"category": "external",
"summary": "RHBZ#1617842",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617842"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2005-3857",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-3857"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-3857",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3857"
}
],
"release_date": "2005-11-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-01-17T08:36:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/",
"product_ids": [
"4AS:kernel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-0:2.6.9-22.0.2.EL.src",
"4AS:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.src",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-0:2.6.9-22.0.2.EL.src",
"4ES:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-0:2.6.9-22.0.2.EL.src",
"4WS:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0101"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2005-3858",
"discovery_date": "2005-11-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1617843"
}
],
"notes": [
{
"category": "description",
"text": "Memory leak in the ip6_input_finish function in ip6_input.c in Linux kernel 2.6.12 and earlier might allow attackers to cause a denial of service via malformed IPv6 packets with unspecified parameter problems, which prevents the SKB from being freed.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:kernel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-0:2.6.9-22.0.2.EL.src",
"4AS:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.src",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-0:2.6.9-22.0.2.EL.src",
"4ES:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-0:2.6.9-22.0.2.EL.src",
"4WS:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2005-3858"
},
{
"category": "external",
"summary": "RHBZ#1617843",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617843"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2005-3858",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-3858"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-3858",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3858"
}
],
"release_date": "2005-08-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-01-17T08:36:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/",
"product_ids": [
"4AS:kernel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-0:2.6.9-22.0.2.EL.src",
"4AS:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.src",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-0:2.6.9-22.0.2.EL.src",
"4ES:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-0:2.6.9-22.0.2.EL.src",
"4WS:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0101"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2005-4605",
"discovery_date": "2005-12-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1617860"
}
],
"notes": [
{
"category": "description",
"text": "The procfs code (proc_misc.c) in Linux 2.6.14.3 and other versions before 2.6.15 allows attackers to read sensitive kernel memory via unspecified vectors in which a signed value is added to an unsigned value.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:kernel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-0:2.6.9-22.0.2.EL.src",
"4AS:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.src",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-0:2.6.9-22.0.2.EL.src",
"4ES:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-0:2.6.9-22.0.2.EL.src",
"4WS:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2005-4605"
},
{
"category": "external",
"summary": "RHBZ#1617860",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617860"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2005-4605",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-4605"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-4605",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2005-4605"
}
],
"release_date": "2005-12-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-01-17T08:36:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/",
"product_ids": [
"4AS:kernel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-0:2.6.9-22.0.2.EL.src",
"4AS:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4AS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.src",
"4Desktop:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-0:2.6.9-22.0.2.EL.src",
"4ES:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4ES:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-0:2.6.9-22.0.2.EL.src",
"4WS:kernel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ia64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390x",
"4WS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-22.0.2.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0101"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "security flaw"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…