rhsa-2009_0021
Vulnerability from csaf_redhat
Published
2009-02-25 01:02
Modified
2024-11-22 02:58
Summary
Red Hat Security Advisory: kernel security update
Notes
Topic
Updated kernel packages that resolve several security issues are now
available for Red Hat Enterprise Linux 5.2 Extended Update Support.
This update has been rated as having important security impact by the Red
Hat Security Response Team.
Details
The kernel packages contain the Linux kernel, the core of any Linux
operating system.
This update includes backported fixes for four security issues. These
issues only affected users of Red Hat Enterprise Linux 5.2 Extended Update
Support as they have already been addressed for users of Red Hat Enterprise
Linux 5 in the 5.3 update, RHSA-2009:0225.
In accordance with the support policy, future security updates to Red Hat
Enterprise Linux 5.2 Extended Update Support will only include issues of
critical security impact.
* when fput() was called to close a socket, the __scm_destroy() function
in the Linux kernel could make indirect recursive calls to itself. This
could, potentially, lead to a denial of service issue. (CVE-2008-5029,
Important)
* the sendmsg() function in the Linux kernel did not block during UNIX
socket garbage collection. This could, potentially, lead to a local denial
of service. (CVE-2008-5300, Important)
* a flaw was found in the Asynchronous Transfer Mode (ATM) subsystem. A
local, unprivileged user could use the flaw to listen on the same socket
more than once, possibly causing a denial of service. (CVE-2008-5079,
Important)
* a race condition was found in the Linux kernel "inotify" watch removal
and umount implementation. This could allow a local, unprivileged user
to cause a privilege escalation or a denial of service. (CVE-2008-5182,
Important)
Users should upgrade to these updated packages, which contain backported
patches to correct these issues. Note: for this update to take effect, the
system must be rebooted.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages that resolve several security issues are now\navailable for Red Hat Enterprise Linux 5.2 Extended Update Support.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update includes backported fixes for four security issues. These\nissues only affected users of Red Hat Enterprise Linux 5.2 Extended Update\nSupport as they have already been addressed for users of Red Hat Enterprise\nLinux 5 in the 5.3 update, RHSA-2009:0225.\n\nIn accordance with the support policy, future security updates to Red Hat\nEnterprise Linux 5.2 Extended Update Support will only include issues of\ncritical security impact.\n\n* when fput() was called to close a socket, the __scm_destroy() function\nin the Linux kernel could make indirect recursive calls to itself. This\ncould, potentially, lead to a denial of service issue. (CVE-2008-5029,\nImportant)\n\n* the sendmsg() function in the Linux kernel did not block during UNIX\nsocket garbage collection. This could, potentially, lead to a local denial\nof service. (CVE-2008-5300, Important)\n\n* a flaw was found in the Asynchronous Transfer Mode (ATM) subsystem. A\nlocal, unprivileged user could use the flaw to listen on the same socket\nmore than once, possibly causing a denial of service. (CVE-2008-5079,\nImportant)\n\n* a race condition was found in the Linux kernel \"inotify\" watch removal\nand umount implementation. This could allow a local, unprivileged user\nto cause a privilege escalation or a denial of service. (CVE-2008-5182,\nImportant)\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. Note: for this update to take effect, the\nsystem must be rebooted.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2009:0021", "url": "https://access.redhat.com/errata/RHSA-2009:0021" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "470201", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=470201" }, { "category": "external", "summary": "472325", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=472325" }, { "category": "external", "summary": "473259", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=473259" }, { "category": "external", "summary": "473696", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=473696" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_0021.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2024-11-22T02:58:42+00:00", "generator": { "date": "2024-11-22T02:58:42+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2009:0021", "initial_release_date": "2009-02-25T01:02:00+00:00", "revision_history": [ { "date": "2009-02-25T01:02:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2009-02-24T20:04:12+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T02:58:42+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux EUS (v. 5.2 server)", "product": { "name": "Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:5.2" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-PAE-0:2.6.18-92.1.24.el5.i686", "product": { "name": "kernel-PAE-0:2.6.18-92.1.24.el5.i686", "product_id": "kernel-PAE-0:2.6.18-92.1.24.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-92.1.24.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-92.1.24.el5.i686", "product": { "name": "kernel-0:2.6.18-92.1.24.el5.i686", "product_id": "kernel-0:2.6.18-92.1.24.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-92.1.24.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-92.1.24.el5.i686", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-92.1.24.el5.i686", "product_id": "kernel-xen-debuginfo-0:2.6.18-92.1.24.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-92.1.24.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-92.1.24.el5.i686", "product": { "name": "kernel-xen-devel-0:2.6.18-92.1.24.el5.i686", "product_id": "kernel-xen-devel-0:2.6.18-92.1.24.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-92.1.24.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-debuginfo-0:2.6.18-92.1.24.el5.i686", "product": { "name": "kernel-PAE-debuginfo-0:2.6.18-92.1.24.el5.i686", "product_id": "kernel-PAE-debuginfo-0:2.6.18-92.1.24.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-92.1.24.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-92.1.24.el5.i686", "product": { "name": "kernel-debug-0:2.6.18-92.1.24.el5.i686", "product_id": "kernel-debug-0:2.6.18-92.1.24.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-92.1.24.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.i686", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.i686", "product_id": "kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-92.1.24.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-devel-0:2.6.18-92.1.24.el5.i686", "product": { "name": "kernel-PAE-devel-0:2.6.18-92.1.24.el5.i686", "product_id": "kernel-PAE-devel-0:2.6.18-92.1.24.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-92.1.24.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-92.1.24.el5.i686", "product": { "name": "kernel-debug-devel-0:2.6.18-92.1.24.el5.i686", "product_id": "kernel-debug-devel-0:2.6.18-92.1.24.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-92.1.24.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-92.1.24.el5.i686", "product": { "name": "kernel-devel-0:2.6.18-92.1.24.el5.i686", "product_id": "kernel-devel-0:2.6.18-92.1.24.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-92.1.24.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-92.1.24.el5.i686", "product": { "name": "kernel-debuginfo-common-0:2.6.18-92.1.24.el5.i686", "product_id": "kernel-debuginfo-common-0:2.6.18-92.1.24.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-92.1.24.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-92.1.24.el5.i686", "product": { "name": "kernel-xen-0:2.6.18-92.1.24.el5.i686", "product_id": "kernel-xen-0:2.6.18-92.1.24.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-92.1.24.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-92.1.24.el5.i686", "product": { "name": "kernel-debuginfo-0:2.6.18-92.1.24.el5.i686", "product_id": "kernel-debuginfo-0:2.6.18-92.1.24.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-92.1.24.el5?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-92.1.24.el5.i386", "product": { "name": "kernel-headers-0:2.6.18-92.1.24.el5.i386", "product_id": "kernel-headers-0:2.6.18-92.1.24.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.1.24.el5?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "kernel-kdump-0:2.6.18-92.1.24.el5.ppc64", "product": { "name": "kernel-kdump-0:2.6.18-92.1.24.el5.ppc64", "product_id": "kernel-kdump-0:2.6.18-92.1.24.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-92.1.24.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-92.1.24.el5.ppc64", "product": { "name": "kernel-0:2.6.18-92.1.24.el5.ppc64", "product_id": "kernel-0:2.6.18-92.1.24.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-92.1.24.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.18-92.1.24.el5.ppc64", "product": { "name": "kernel-kdump-debuginfo-0:2.6.18-92.1.24.el5.ppc64", "product_id": "kernel-kdump-debuginfo-0:2.6.18-92.1.24.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-92.1.24.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-92.1.24.el5.ppc64", "product": { "name": "kernel-debug-0:2.6.18-92.1.24.el5.ppc64", "product_id": "kernel-debug-0:2.6.18-92.1.24.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-92.1.24.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.18-92.1.24.el5.ppc64", "product": { "name": "kernel-kdump-devel-0:2.6.18-92.1.24.el5.ppc64", "product_id": "kernel-kdump-devel-0:2.6.18-92.1.24.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-92.1.24.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.ppc64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.ppc64", "product_id": "kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-92.1.24.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-92.1.24.el5.ppc64", "product": { "name": "kernel-debug-devel-0:2.6.18-92.1.24.el5.ppc64", "product_id": "kernel-debug-devel-0:2.6.18-92.1.24.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-92.1.24.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-92.1.24.el5.ppc64", "product": { "name": "kernel-headers-0:2.6.18-92.1.24.el5.ppc64", "product_id": "kernel-headers-0:2.6.18-92.1.24.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.1.24.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-92.1.24.el5.ppc64", "product": { "name": "kernel-devel-0:2.6.18-92.1.24.el5.ppc64", "product_id": "kernel-devel-0:2.6.18-92.1.24.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-92.1.24.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-92.1.24.el5.ppc64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-92.1.24.el5.ppc64", "product_id": "kernel-debuginfo-common-0:2.6.18-92.1.24.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-92.1.24.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-92.1.24.el5.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.18-92.1.24.el5.ppc64", "product_id": "kernel-debuginfo-0:2.6.18-92.1.24.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-92.1.24.el5?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-92.1.24.el5.ppc", "product": { "name": "kernel-headers-0:2.6.18-92.1.24.el5.ppc", "product_id": "kernel-headers-0:2.6.18-92.1.24.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.1.24.el5?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "kernel-kdump-0:2.6.18-92.1.24.el5.s390x", "product": { "name": "kernel-kdump-0:2.6.18-92.1.24.el5.s390x", "product_id": "kernel-kdump-0:2.6.18-92.1.24.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-92.1.24.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-92.1.24.el5.s390x", "product": { "name": "kernel-0:2.6.18-92.1.24.el5.s390x", "product_id": "kernel-0:2.6.18-92.1.24.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-92.1.24.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.18-92.1.24.el5.s390x", "product": { "name": "kernel-kdump-debuginfo-0:2.6.18-92.1.24.el5.s390x", "product_id": "kernel-kdump-debuginfo-0:2.6.18-92.1.24.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-92.1.24.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-92.1.24.el5.s390x", "product": { "name": "kernel-debug-0:2.6.18-92.1.24.el5.s390x", "product_id": "kernel-debug-0:2.6.18-92.1.24.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-92.1.24.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.18-92.1.24.el5.s390x", "product": { "name": "kernel-kdump-devel-0:2.6.18-92.1.24.el5.s390x", "product_id": "kernel-kdump-devel-0:2.6.18-92.1.24.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-92.1.24.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.s390x", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.s390x", "product_id": "kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-92.1.24.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-92.1.24.el5.s390x", "product": { "name": "kernel-debug-devel-0:2.6.18-92.1.24.el5.s390x", "product_id": "kernel-debug-devel-0:2.6.18-92.1.24.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-92.1.24.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-92.1.24.el5.s390x", "product": { "name": "kernel-headers-0:2.6.18-92.1.24.el5.s390x", "product_id": "kernel-headers-0:2.6.18-92.1.24.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.1.24.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-92.1.24.el5.s390x", "product": { "name": "kernel-devel-0:2.6.18-92.1.24.el5.s390x", "product_id": "kernel-devel-0:2.6.18-92.1.24.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-92.1.24.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-92.1.24.el5.s390x", "product": { "name": "kernel-debuginfo-common-0:2.6.18-92.1.24.el5.s390x", "product_id": "kernel-debuginfo-common-0:2.6.18-92.1.24.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-92.1.24.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-92.1.24.el5.s390x", "product": { "name": "kernel-debuginfo-0:2.6.18-92.1.24.el5.s390x", "product_id": "kernel-debuginfo-0:2.6.18-92.1.24.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-92.1.24.el5?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.18-92.1.24.el5.noarch", "product": { "name": "kernel-doc-0:2.6.18-92.1.24.el5.noarch", "product_id": "kernel-doc-0:2.6.18-92.1.24.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.18-92.1.24.el5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.18-92.1.24.el5.ia64", "product": { "name": "kernel-0:2.6.18-92.1.24.el5.ia64", "product_id": "kernel-0:2.6.18-92.1.24.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-92.1.24.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-92.1.24.el5.ia64", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-92.1.24.el5.ia64", "product_id": "kernel-xen-debuginfo-0:2.6.18-92.1.24.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-92.1.24.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-92.1.24.el5.ia64", "product": { "name": "kernel-xen-devel-0:2.6.18-92.1.24.el5.ia64", "product_id": "kernel-xen-devel-0:2.6.18-92.1.24.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-92.1.24.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-92.1.24.el5.ia64", "product": { "name": "kernel-debug-0:2.6.18-92.1.24.el5.ia64", "product_id": "kernel-debug-0:2.6.18-92.1.24.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-92.1.24.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.ia64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.ia64", "product_id": "kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-92.1.24.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-92.1.24.el5.ia64", "product": { "name": "kernel-debug-devel-0:2.6.18-92.1.24.el5.ia64", "product_id": "kernel-debug-devel-0:2.6.18-92.1.24.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-92.1.24.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-92.1.24.el5.ia64", "product": { "name": "kernel-headers-0:2.6.18-92.1.24.el5.ia64", "product_id": "kernel-headers-0:2.6.18-92.1.24.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.1.24.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-92.1.24.el5.ia64", "product": { "name": "kernel-devel-0:2.6.18-92.1.24.el5.ia64", "product_id": "kernel-devel-0:2.6.18-92.1.24.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-92.1.24.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-92.1.24.el5.ia64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-92.1.24.el5.ia64", "product_id": "kernel-debuginfo-common-0:2.6.18-92.1.24.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-92.1.24.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-92.1.24.el5.ia64", "product": { "name": "kernel-xen-0:2.6.18-92.1.24.el5.ia64", "product_id": "kernel-xen-0:2.6.18-92.1.24.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-92.1.24.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-92.1.24.el5.ia64", "product": { "name": "kernel-debuginfo-0:2.6.18-92.1.24.el5.ia64", "product_id": "kernel-debuginfo-0:2.6.18-92.1.24.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-92.1.24.el5?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.18-92.1.24.el5.src", "product": { "name": "kernel-0:2.6.18-92.1.24.el5.src", "product_id": "kernel-0:2.6.18-92.1.24.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-92.1.24.el5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.18-92.1.24.el5.x86_64", "product": { "name": "kernel-0:2.6.18-92.1.24.el5.x86_64", "product_id": "kernel-0:2.6.18-92.1.24.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-92.1.24.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-92.1.24.el5.x86_64", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-92.1.24.el5.x86_64", "product_id": "kernel-xen-debuginfo-0:2.6.18-92.1.24.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-92.1.24.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-92.1.24.el5.x86_64", "product": { "name": "kernel-xen-devel-0:2.6.18-92.1.24.el5.x86_64", "product_id": "kernel-xen-devel-0:2.6.18-92.1.24.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-92.1.24.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-92.1.24.el5.x86_64", "product": { "name": "kernel-debug-0:2.6.18-92.1.24.el5.x86_64", "product_id": "kernel-debug-0:2.6.18-92.1.24.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-92.1.24.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-92.1.24.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-92.1.24.el5.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.18-92.1.24.el5.x86_64", "product_id": "kernel-debug-devel-0:2.6.18-92.1.24.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-92.1.24.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-92.1.24.el5.x86_64", "product": { "name": "kernel-headers-0:2.6.18-92.1.24.el5.x86_64", "product_id": "kernel-headers-0:2.6.18-92.1.24.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.1.24.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-92.1.24.el5.x86_64", "product": { "name": "kernel-devel-0:2.6.18-92.1.24.el5.x86_64", "product_id": "kernel-devel-0:2.6.18-92.1.24.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-92.1.24.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-92.1.24.el5.x86_64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-92.1.24.el5.x86_64", "product_id": "kernel-debuginfo-common-0:2.6.18-92.1.24.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-92.1.24.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-92.1.24.el5.x86_64", "product": { "name": "kernel-xen-0:2.6.18-92.1.24.el5.x86_64", "product_id": "kernel-xen-0:2.6.18-92.1.24.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-92.1.24.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-92.1.24.el5.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.18-92.1.24.el5.x86_64", "product_id": "kernel-debuginfo-0:2.6.18-92.1.24.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-92.1.24.el5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-92.1.24.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-0:2.6.18-92.1.24.el5.i686" }, "product_reference": "kernel-0:2.6.18-92.1.24.el5.i686", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-92.1.24.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-0:2.6.18-92.1.24.el5.ia64" }, "product_reference": "kernel-0:2.6.18-92.1.24.el5.ia64", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-92.1.24.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-0:2.6.18-92.1.24.el5.ppc64" }, "product_reference": "kernel-0:2.6.18-92.1.24.el5.ppc64", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-92.1.24.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-0:2.6.18-92.1.24.el5.s390x" }, "product_reference": "kernel-0:2.6.18-92.1.24.el5.s390x", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-92.1.24.el5.src as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-0:2.6.18-92.1.24.el5.src" }, "product_reference": "kernel-0:2.6.18-92.1.24.el5.src", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-92.1.24.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-0:2.6.18-92.1.24.el5.x86_64" }, "product_reference": "kernel-0:2.6.18-92.1.24.el5.x86_64", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-0:2.6.18-92.1.24.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.24.el5.i686" }, "product_reference": "kernel-PAE-0:2.6.18-92.1.24.el5.i686", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-debuginfo-0:2.6.18-92.1.24.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.24.el5.i686" }, "product_reference": "kernel-PAE-debuginfo-0:2.6.18-92.1.24.el5.i686", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-devel-0:2.6.18-92.1.24.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.24.el5.i686" }, "product_reference": "kernel-PAE-devel-0:2.6.18-92.1.24.el5.i686", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-92.1.24.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.24.el5.i686" }, "product_reference": "kernel-debug-0:2.6.18-92.1.24.el5.i686", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-92.1.24.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.24.el5.ia64" }, "product_reference": "kernel-debug-0:2.6.18-92.1.24.el5.ia64", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-92.1.24.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.24.el5.ppc64" }, "product_reference": "kernel-debug-0:2.6.18-92.1.24.el5.ppc64", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-92.1.24.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.24.el5.s390x" }, "product_reference": "kernel-debug-0:2.6.18-92.1.24.el5.s390x", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-92.1.24.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.24.el5.x86_64" }, "product_reference": "kernel-debug-0:2.6.18-92.1.24.el5.x86_64", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.i686", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.ia64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.ia64", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.ppc64", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.s390x", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.x86_64", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-92.1.24.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.24.el5.i686" }, "product_reference": "kernel-debug-devel-0:2.6.18-92.1.24.el5.i686", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-92.1.24.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.24.el5.ia64" }, "product_reference": "kernel-debug-devel-0:2.6.18-92.1.24.el5.ia64", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-92.1.24.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.24.el5.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.18-92.1.24.el5.ppc64", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-92.1.24.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.24.el5.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.18-92.1.24.el5.s390x", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-92.1.24.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.24.el5.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.18-92.1.24.el5.x86_64", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-92.1.24.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.24.el5.i686" }, "product_reference": "kernel-debuginfo-0:2.6.18-92.1.24.el5.i686", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-92.1.24.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.24.el5.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.18-92.1.24.el5.ia64", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-92.1.24.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.24.el5.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.18-92.1.24.el5.ppc64", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-92.1.24.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.24.el5.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.18-92.1.24.el5.s390x", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-92.1.24.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.24.el5.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.18-92.1.24.el5.x86_64", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-92.1.24.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.24.el5.i686" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.24.el5.i686", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-92.1.24.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.24.el5.ia64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.24.el5.ia64", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-92.1.24.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.24.el5.ppc64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.24.el5.ppc64", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-92.1.24.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.24.el5.s390x" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.24.el5.s390x", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-92.1.24.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.24.el5.x86_64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.24.el5.x86_64", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-92.1.24.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.24.el5.i686" }, "product_reference": "kernel-devel-0:2.6.18-92.1.24.el5.i686", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-92.1.24.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.24.el5.ia64" }, "product_reference": "kernel-devel-0:2.6.18-92.1.24.el5.ia64", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-92.1.24.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.24.el5.ppc64" }, "product_reference": "kernel-devel-0:2.6.18-92.1.24.el5.ppc64", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-92.1.24.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.24.el5.s390x" }, "product_reference": "kernel-devel-0:2.6.18-92.1.24.el5.s390x", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-92.1.24.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.24.el5.x86_64" }, "product_reference": "kernel-devel-0:2.6.18-92.1.24.el5.x86_64", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.18-92.1.24.el5.noarch as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.24.el5.noarch" }, "product_reference": "kernel-doc-0:2.6.18-92.1.24.el5.noarch", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-92.1.24.el5.i386 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.24.el5.i386" }, "product_reference": "kernel-headers-0:2.6.18-92.1.24.el5.i386", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-92.1.24.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.24.el5.ia64" }, "product_reference": "kernel-headers-0:2.6.18-92.1.24.el5.ia64", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-92.1.24.el5.ppc as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.24.el5.ppc" }, "product_reference": "kernel-headers-0:2.6.18-92.1.24.el5.ppc", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-92.1.24.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.24.el5.ppc64" }, "product_reference": "kernel-headers-0:2.6.18-92.1.24.el5.ppc64", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-92.1.24.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.24.el5.s390x" }, "product_reference": "kernel-headers-0:2.6.18-92.1.24.el5.s390x", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-92.1.24.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.24.el5.x86_64" }, "product_reference": "kernel-headers-0:2.6.18-92.1.24.el5.x86_64", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-92.1.24.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.24.el5.ppc64" }, "product_reference": "kernel-kdump-0:2.6.18-92.1.24.el5.ppc64", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-92.1.24.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.24.el5.s390x" }, "product_reference": "kernel-kdump-0:2.6.18-92.1.24.el5.s390x", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-92.1.24.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.24.el5.ppc64" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-92.1.24.el5.ppc64", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-92.1.24.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.24.el5.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-92.1.24.el5.s390x", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-92.1.24.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.24.el5.ppc64" }, "product_reference": "kernel-kdump-devel-0:2.6.18-92.1.24.el5.ppc64", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-92.1.24.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.24.el5.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.18-92.1.24.el5.s390x", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-92.1.24.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.24.el5.i686" }, "product_reference": "kernel-xen-0:2.6.18-92.1.24.el5.i686", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-92.1.24.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.24.el5.ia64" }, "product_reference": "kernel-xen-0:2.6.18-92.1.24.el5.ia64", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-92.1.24.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.24.el5.x86_64" }, "product_reference": "kernel-xen-0:2.6.18-92.1.24.el5.x86_64", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-92.1.24.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.24.el5.i686" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-92.1.24.el5.i686", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-92.1.24.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.24.el5.ia64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-92.1.24.el5.ia64", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-92.1.24.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.24.el5.x86_64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-92.1.24.el5.x86_64", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-92.1.24.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.24.el5.i686" }, "product_reference": "kernel-xen-devel-0:2.6.18-92.1.24.el5.i686", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-92.1.24.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.24.el5.ia64" }, "product_reference": "kernel-xen-devel-0:2.6.18-92.1.24.el5.ia64", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-92.1.24.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.24.el5.x86_64" }, "product_reference": "kernel-xen-devel-0:2.6.18-92.1.24.el5.x86_64", "relates_to_product_reference": "5Server-5.2.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2008-5029", "discovery_date": "2008-11-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "470201" } ], "notes": [ { "category": "description", "text": "The __scm_destroy function in net/core/scm.c in the Linux kernel 2.6.27.4, 2.6.26, and earlier makes indirect recursive calls to itself through calls to the fput function, which allows local users to cause a denial of service (panic) via vectors related to sending an SCM_RIGHTS message through a UNIX domain socket and closing file descriptors.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Unix sockets kernel panic", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.2.Z:kernel-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-0:2.6.18-92.1.24.el5.src", "5Server-5.2.Z:kernel-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.24.el5.noarch", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.24.el5.i386", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.24.el5.ppc", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.24.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-5029" }, { "category": "external", "summary": "RHBZ#470201", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=470201" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-5029", "url": "https://www.cve.org/CVERecord?id=CVE-2008-5029" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-5029", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5029" } ], "release_date": "2008-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-02-25T01:02:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-5.2.Z:kernel-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-0:2.6.18-92.1.24.el5.src", "5Server-5.2.Z:kernel-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.24.el5.noarch", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.24.el5.i386", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.24.el5.ppc", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.24.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2009:0021" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Server-5.2.Z:kernel-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-0:2.6.18-92.1.24.el5.src", "5Server-5.2.Z:kernel-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.24.el5.noarch", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.24.el5.i386", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.24.el5.ppc", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.24.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: Unix sockets kernel panic" }, { "cve": "CVE-2008-5079", "discovery_date": "2008-11-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "473696" } ], "notes": [ { "category": "description", "text": "net/atm/svc.c in the ATM subsystem in the Linux kernel 2.6.27.8 and earlier allows local users to cause a denial of service (kernel infinite loop) by making two calls to svc_listen for the same socket, and then reading a /proc/net/atm/*vc file, related to corruption of the vcc table.", "title": "Vulnerability description" }, { "category": "summary", "text": "Linux Kernel \u0027atm module\u0027 Local Denial of Service", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "5Server-5.2.Z:kernel-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-0:2.6.18-92.1.24.el5.src", "5Server-5.2.Z:kernel-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.24.el5.noarch", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.24.el5.i386", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.24.el5.ppc", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.24.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-5079" }, { "category": "external", "summary": "RHBZ#473696", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=473696" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-5079", "url": "https://www.cve.org/CVERecord?id=CVE-2008-5079" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-5079", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5079" } ], "release_date": "2008-12-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-02-25T01:02:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-5.2.Z:kernel-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-0:2.6.18-92.1.24.el5.src", "5Server-5.2.Z:kernel-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.24.el5.noarch", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.24.el5.i386", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.24.el5.ppc", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.24.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2009:0021" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Linux Kernel \u0027atm module\u0027 Local Denial of Service" }, { "cve": "CVE-2008-5182", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2008-11-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "472325" } ], "notes": [ { "category": "description", "text": "The inotify functionality in Linux kernel 2.6 before 2.6.28-rc5 might allow local users to gain privileges via unknown vectors related to race conditions in inotify watch removal and umount.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: fix inotify watch removal/umount races", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.2.Z:kernel-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-0:2.6.18-92.1.24.el5.src", "5Server-5.2.Z:kernel-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.24.el5.noarch", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.24.el5.i386", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.24.el5.ppc", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.24.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-5182" }, { "category": "external", "summary": "RHBZ#472325", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=472325" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-5182", "url": "https://www.cve.org/CVERecord?id=CVE-2008-5182" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-5182", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5182" } ], "release_date": "2008-11-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-02-25T01:02:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-5.2.Z:kernel-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-0:2.6.18-92.1.24.el5.src", "5Server-5.2.Z:kernel-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.24.el5.noarch", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.24.el5.i386", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.24.el5.ppc", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.24.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2009:0021" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "5Server-5.2.Z:kernel-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-0:2.6.18-92.1.24.el5.src", "5Server-5.2.Z:kernel-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.24.el5.noarch", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.24.el5.i386", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.24.el5.ppc", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.24.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: fix inotify watch removal/umount races" }, { "cve": "CVE-2008-5300", "discovery_date": "2008-11-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "473259" } ], "notes": [ { "category": "description", "text": "Linux kernel 2.6.28 allows local users to cause a denial of service (\"soft lockup\" and process loss) via a large number of sendmsg function calls, which does not block during AF_UNIX garbage collection and triggers an OOM condition, a different vulnerability than CVE-2008-5029.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: fix soft lockups/OOM issues with unix socket garbage collector", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "5Server-5.2.Z:kernel-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-0:2.6.18-92.1.24.el5.src", "5Server-5.2.Z:kernel-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.24.el5.noarch", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.24.el5.i386", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.24.el5.ppc", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.24.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-5300" }, { "category": "external", "summary": "RHBZ#473259", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=473259" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-5300", "url": "https://www.cve.org/CVERecord?id=CVE-2008-5300" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-5300", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5300" } ], "release_date": "2008-11-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-02-25T01:02:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-5.2.Z:kernel-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-0:2.6.18-92.1.24.el5.src", "5Server-5.2.Z:kernel-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.24.el5.noarch", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.24.el5.i386", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.24.el5.ppc", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.24.el5.ppc64", "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.24.el5.s390x", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.24.el5.x86_64", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.24.el5.i686", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.24.el5.ia64", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.24.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2009:0021" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: fix soft lockups/OOM issues with unix socket garbage collector" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.