rhsa-2010:0178
Vulnerability from csaf_redhat
Published
2010-03-29 12:00
Modified
2025-11-21 17:35
Summary
Red Hat Security Advisory: Red Hat Enterprise Linux 5.5 kernel security and bug fix update
Notes
Topic
Updated kernel packages that fix three security issues, address several
hundred bugs, and add numerous enhancements are now available as part of
the ongoing support and maintenance of Red Hat Enterprise Linux version 5.
This is the fifth regular update.
The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux
operating system.
This update fixes the following security issues:
* a race condition was found in the mac80211 implementation, a framework
used for writing drivers for wireless devices. An attacker could trigger
this flaw by sending a Delete Block ACK (DELBA) packet to a target system,
resulting in a remote denial of service. Note: This issue only affected
users on 802.11n networks, and that also use the iwlagn driver with Intel
wireless hardware. (CVE-2009-4027, Important)
* a flaw was found in the gfs2_lock() implementation. The GFS2 locking code
could skip the lock operation for files that have the S_ISGID bit
(set-group-ID on execution) in their mode set. A local, unprivileged user
on a system that has a GFS2 file system mounted could use this flaw to
cause a kernel panic. (CVE-2010-0727, Moderate)
* a divide-by-zero flaw was found in the ext4 file system code. A local
attacker could use this flaw to cause a denial of service by mounting a
specially-crafted ext4 file system. (CVE-2009-4307, Low)
These updated packages also include several hundred bug fixes for and
enhancements to the Linux kernel. Space precludes documenting each of these
changes in this advisory and users are directed to the Red Hat Enterprise
Linux 5.5 Release Notes for information on the most significant of these
changes:
http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5.5/html/Release_Notes/
Also, for details concerning every bug fixed in and every enhancement added
to the kernel for this release, refer to the kernel chapter in the Red Hat
Enterprise Linux 5.5 Technical Notes:
http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5.5/html/Technical_Notes/kernel.html
All Red Hat Enterprise Linux 5 users are advised to install these updated
packages, which address these vulnerabilities as well as fixing the bugs
and adding the enhancements noted in the Red Hat Enterprise Linux 5.5
Release Notes and Technical Notes. The system must be rebooted for this
update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated kernel packages that fix three security issues, address several\nhundred bugs, and add numerous enhancements are now available as part of\nthe ongoing support and maintenance of Red Hat Enterprise Linux version 5.\nThis is the fifth regular update.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues:\n\n* a race condition was found in the mac80211 implementation, a framework\nused for writing drivers for wireless devices. An attacker could trigger\nthis flaw by sending a Delete Block ACK (DELBA) packet to a target system,\nresulting in a remote denial of service. Note: This issue only affected\nusers on 802.11n networks, and that also use the iwlagn driver with Intel\nwireless hardware. (CVE-2009-4027, Important)\n\n* a flaw was found in the gfs2_lock() implementation. The GFS2 locking code\ncould skip the lock operation for files that have the S_ISGID bit\n(set-group-ID on execution) in their mode set. A local, unprivileged user\non a system that has a GFS2 file system mounted could use this flaw to\ncause a kernel panic. (CVE-2010-0727, Moderate)\n\n* a divide-by-zero flaw was found in the ext4 file system code. A local\nattacker could use this flaw to cause a denial of service by mounting a\nspecially-crafted ext4 file system. (CVE-2009-4307, Low)\n\nThese updated packages also include several hundred bug fixes for and\nenhancements to the Linux kernel. Space precludes documenting each of these\nchanges in this advisory and users are directed to the Red Hat Enterprise\nLinux 5.5 Release Notes for information on the most significant of these\nchanges:\n\nhttp://www.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5.5/html/Release_Notes/\n\nAlso, for details concerning every bug fixed in and every enhancement added\nto the kernel for this release, refer to the kernel chapter in the Red Hat\nEnterprise Linux 5.5 Technical Notes:\n\nhttp://www.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5.5/html/Technical_Notes/kernel.html\n\nAll Red Hat Enterprise Linux 5 users are advised to install these updated\npackages, which address these vulnerabilities as well as fixing the bugs\nand adding the enhancements noted in the Red Hat Enterprise Linux 5.5\nRelease Notes and Technical Notes. The system must be rebooted for this\nupdate to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2010:0178",
"url": "https://access.redhat.com/errata/RHSA-2010:0178"
},
{
"category": "external",
"summary": "461442",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=461442"
},
{
"category": "external",
"summary": "493517",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=493517"
},
{
"category": "external",
"summary": "500653",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=500653"
},
{
"category": "external",
"summary": "500838",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=500838"
},
{
"category": "external",
"summary": "501030",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=501030"
},
{
"category": "external",
"summary": "501075",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=501075"
},
{
"category": "external",
"summary": "510225",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=510225"
},
{
"category": "external",
"summary": "510257",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=510257"
},
{
"category": "external",
"summary": "510746",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=510746"
},
{
"category": "external",
"summary": "517928",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=517928"
},
{
"category": "external",
"summary": "518103",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=518103"
},
{
"category": "external",
"summary": "521093",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=521093"
},
{
"category": "external",
"summary": "521203",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=521203"
},
{
"category": "external",
"summary": "526259",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=526259"
},
{
"category": "external",
"summary": "526481",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=526481"
},
{
"category": "external",
"summary": "531016",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=531016"
},
{
"category": "external",
"summary": "549763",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=549763"
},
{
"category": "external",
"summary": "550014",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=550014"
},
{
"category": "external",
"summary": "567718",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=567718"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5.5/html/Release_Notes/",
"url": "http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5.5/html/Release_Notes/"
},
{
"category": "external",
"summary": "http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5.5/html/Technical_Notes/kernel.html",
"url": "http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5.5/html/Technical_Notes/kernel.html"
},
{
"category": "external",
"summary": "250561",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=250561"
},
{
"category": "external",
"summary": "322881",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=322881"
},
{
"category": "external",
"summary": "427709",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427709"
},
{
"category": "external",
"summary": "446061",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=446061"
},
{
"category": "external",
"summary": "448130",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=448130"
},
{
"category": "external",
"summary": "450121",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=450121"
},
{
"category": "external",
"summary": "452129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=452129"
},
{
"category": "external",
"summary": "456181",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=456181"
},
{
"category": "external",
"summary": "461100",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=461100"
},
{
"category": "external",
"summary": "461506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=461506"
},
{
"category": "external",
"summary": "466681",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=466681"
},
{
"category": "external",
"summary": "469976",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=469976"
},
{
"category": "external",
"summary": "473404",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=473404"
},
{
"category": "external",
"summary": "476075",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=476075"
},
{
"category": "external",
"summary": "481658",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=481658"
},
{
"category": "external",
"summary": "482756",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=482756"
},
{
"category": "external",
"summary": "483646",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=483646"
},
{
"category": "external",
"summary": "485016",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=485016"
},
{
"category": "external",
"summary": "485099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=485099"
},
{
"category": "external",
"summary": "486092",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=486092"
},
{
"category": "external",
"summary": "486975",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=486975"
},
{
"category": "external",
"summary": "487346",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=487346"
},
{
"category": "external",
"summary": "487763",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=487763"
},
{
"category": "external",
"summary": "488161",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=488161"
},
{
"category": "external",
"summary": "489566",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=489566"
},
{
"category": "external",
"summary": "489774",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=489774"
},
{
"category": "external",
"summary": "489931",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=489931"
},
{
"category": "external",
"summary": "491010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=491010"
},
{
"category": "external",
"summary": "494120",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=494120"
},
{
"category": "external",
"summary": "495059",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=495059"
},
{
"category": "external",
"summary": "496716",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=496716"
},
{
"category": "external",
"summary": "496847",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=496847"
},
{
"category": "external",
"summary": "497200",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=497200"
},
{
"category": "external",
"summary": "497257",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=497257"
},
{
"category": "external",
"summary": "498461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=498461"
},
{
"category": "external",
"summary": "498489",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=498489"
},
{
"category": "external",
"summary": "498510",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=498510"
},
{
"category": "external",
"summary": "498532",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=498532"
},
{
"category": "external",
"summary": "498976",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=498976"
},
{
"category": "external",
"summary": "499019",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=499019"
},
{
"category": "external",
"summary": "499063",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=499063"
},
{
"category": "external",
"summary": "499253",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=499253"
},
{
"category": "external",
"summary": "499884",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=499884"
},
{
"category": "external",
"summary": "500346",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=500346"
},
{
"category": "external",
"summary": "502491",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=502491"
},
{
"category": "external",
"summary": "502531",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=502531"
},
{
"category": "external",
"summary": "502572",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=502572"
},
{
"category": "external",
"summary": "502822",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=502822"
},
{
"category": "external",
"summary": "502826",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=502826"
},
{
"category": "external",
"summary": "502927",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=502927"
},
{
"category": "external",
"summary": "502965",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=502965"
},
{
"category": "external",
"summary": "505331",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=505331"
},
{
"category": "external",
"summary": "506200",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=506200"
},
{
"category": "external",
"summary": "506217",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=506217"
},
{
"category": "external",
"summary": "506799",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=506799"
},
{
"category": "external",
"summary": "506899",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=506899"
},
{
"category": "external",
"summary": "507159",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=507159"
},
{
"category": "external",
"summary": "507549",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=507549"
},
{
"category": "external",
"summary": "509625",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=509625"
},
{
"category": "external",
"summary": "509713",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=509713"
},
{
"category": "external",
"summary": "509809",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=509809"
},
{
"category": "external",
"summary": "509866",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=509866"
},
{
"category": "external",
"summary": "509962",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=509962"
},
{
"category": "external",
"summary": "510814",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=510814"
},
{
"category": "external",
"summary": "510818",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=510818"
},
{
"category": "external",
"summary": "511170",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511170"
},
{
"category": "external",
"summary": "511211",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511211"
},
{
"category": "external",
"summary": "511278",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511278"
},
{
"category": "external",
"summary": "511374",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511374"
},
{
"category": "external",
"summary": "512006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512006"
},
{
"category": "external",
"summary": "512013",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512013"
},
{
"category": "external",
"summary": "512203",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512203"
},
{
"category": "external",
"summary": "512361",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512361"
},
{
"category": "external",
"summary": "512552",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512552"
},
{
"category": "external",
"summary": "513136",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513136"
},
{
"category": "external",
"summary": "513203",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513203"
},
{
"category": "external",
"summary": "513410",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513410"
},
{
"category": "external",
"summary": "513692",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513692"
},
{
"category": "external",
"summary": "513827",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513827"
},
{
"category": "external",
"summary": "514141",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=514141"
},
{
"category": "external",
"summary": "514147",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=514147"
},
{
"category": "external",
"summary": "514250",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=514250"
},
{
"category": "external",
"summary": "514256",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=514256"
},
{
"category": "external",
"summary": "514589",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=514589"
},
{
"category": "external",
"summary": "514654",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=514654"
},
{
"category": "external",
"summary": "515176",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=515176"
},
{
"category": "external",
"summary": "515252",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=515252"
},
{
"category": "external",
"summary": "515312",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=515312"
},
{
"category": "external",
"summary": "515405",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=515405"
},
{
"category": "external",
"summary": "515408",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=515408"
},
{
"category": "external",
"summary": "515529",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=515529"
},
{
"category": "external",
"summary": "515716",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=515716"
},
{
"category": "external",
"summary": "515753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=515753"
},
{
"category": "external",
"summary": "515812",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=515812"
},
{
"category": "external",
"summary": "516541",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=516541"
},
{
"category": "external",
"summary": "516589",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=516589"
},
{
"category": "external",
"summary": "516833",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=516833"
},
{
"category": "external",
"summary": "516881",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=516881"
},
{
"category": "external",
"summary": "517377",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=517377"
},
{
"category": "external",
"summary": "517378",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=517378"
},
{
"category": "external",
"summary": "517454",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=517454"
},
{
"category": "external",
"summary": "517504",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=517504"
},
{
"category": "external",
"summary": "517893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=517893"
},
{
"category": "external",
"summary": "517922",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=517922"
},
{
"category": "external",
"summary": "518106",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=518106"
},
{
"category": "external",
"summary": "518496",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=518496"
},
{
"category": "external",
"summary": "519049",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=519049"
},
{
"category": "external",
"summary": "519076",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=519076"
},
{
"category": "external",
"summary": "519086",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=519086"
},
{
"category": "external",
"summary": "519091",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=519091"
},
{
"category": "external",
"summary": "519112",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=519112"
},
{
"category": "external",
"summary": "519184",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=519184"
},
{
"category": "external",
"summary": "519447",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=519447"
},
{
"category": "external",
"summary": "519453",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=519453"
},
{
"category": "external",
"summary": "519771",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=519771"
},
{
"category": "external",
"summary": "520192",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=520192"
},
{
"category": "external",
"summary": "520297",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=520297"
},
{
"category": "external",
"summary": "520867",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=520867"
},
{
"category": "external",
"summary": "521081",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=521081"
},
{
"category": "external",
"summary": "521345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=521345"
},
{
"category": "external",
"summary": "521865",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=521865"
},
{
"category": "external",
"summary": "522600",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=522600"
},
{
"category": "external",
"summary": "522629",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=522629"
},
{
"category": "external",
"summary": "522745",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=522745"
},
{
"category": "external",
"summary": "522846",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=522846"
},
{
"category": "external",
"summary": "523335",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=523335"
},
{
"category": "external",
"summary": "523450",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=523450"
},
{
"category": "external",
"summary": "523888",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=523888"
},
{
"category": "external",
"summary": "523982",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=523982"
},
{
"category": "external",
"summary": "524052",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=524052"
},
{
"category": "external",
"summary": "524129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=524129"
},
{
"category": "external",
"summary": "524335",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=524335"
},
{
"category": "external",
"summary": "524651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=524651"
},
{
"category": "external",
"summary": "524702",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=524702"
},
{
"category": "external",
"summary": "524787",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=524787"
},
{
"category": "external",
"summary": "525100",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=525100"
},
{
"category": "external",
"summary": "525390",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=525390"
},
{
"category": "external",
"summary": "525467",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=525467"
},
{
"category": "external",
"summary": "526043",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=526043"
},
{
"category": "external",
"summary": "526092",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=526092"
},
{
"category": "external",
"summary": "526612",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=526612"
},
{
"category": "external",
"summary": "526751",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=526751"
},
{
"category": "external",
"summary": "526819",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=526819"
},
{
"category": "external",
"summary": "526888",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=526888"
},
{
"category": "external",
"summary": "527424",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=527424"
},
{
"category": "external",
"summary": "527496",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=527496"
},
{
"category": "external",
"summary": "527748",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=527748"
},
{
"category": "external",
"summary": "528054",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=528054"
},
{
"category": "external",
"summary": "528070",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=528070"
},
{
"category": "external",
"summary": "528153",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=528153"
},
{
"category": "external",
"summary": "529431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=529431"
},
{
"category": "external",
"summary": "529796",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=529796"
},
{
"category": "external",
"summary": "530537",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530537"
},
{
"category": "external",
"summary": "531268",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=531268"
},
{
"category": "external",
"summary": "531488",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=531488"
},
{
"category": "external",
"summary": "531552",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=531552"
},
{
"category": "external",
"summary": "531593",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=531593"
},
{
"category": "external",
"summary": "531784",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=531784"
},
{
"category": "external",
"summary": "532701",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=532701"
},
{
"category": "external",
"summary": "533489",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=533489"
},
{
"category": "external",
"summary": "533496",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=533496"
},
{
"category": "external",
"summary": "534018",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=534018"
},
{
"category": "external",
"summary": "534158",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=534158"
},
{
"category": "external",
"summary": "537514",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=537514"
},
{
"category": "external",
"summary": "537876",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=537876"
},
{
"category": "external",
"summary": "538407",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=538407"
},
{
"category": "external",
"summary": "538484",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=538484"
},
{
"category": "external",
"summary": "539240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=539240"
},
{
"category": "external",
"summary": "539521",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=539521"
},
{
"category": "external",
"summary": "540811",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=540811"
},
{
"category": "external",
"summary": "541149",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=541149"
},
{
"category": "external",
"summary": "541213",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=541213"
},
{
"category": "external",
"summary": "541325",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=541325"
},
{
"category": "external",
"summary": "541953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=541953"
},
{
"category": "external",
"summary": "541956",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=541956"
},
{
"category": "external",
"summary": "542593",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=542593"
},
{
"category": "external",
"summary": "542746",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=542746"
},
{
"category": "external",
"summary": "542834",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=542834"
},
{
"category": "external",
"summary": "543057",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=543057"
},
{
"category": "external",
"summary": "543270",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=543270"
},
{
"category": "external",
"summary": "543307",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=543307"
},
{
"category": "external",
"summary": "544138",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=544138"
},
{
"category": "external",
"summary": "544349",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=544349"
},
{
"category": "external",
"summary": "544417",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=544417"
},
{
"category": "external",
"summary": "544448",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=544448"
},
{
"category": "external",
"summary": "545121",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=545121"
},
{
"category": "external",
"summary": "545135",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=545135"
},
{
"category": "external",
"summary": "545899",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=545899"
},
{
"category": "external",
"summary": "546281",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=546281"
},
{
"category": "external",
"summary": "546326",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=546326"
},
{
"category": "external",
"summary": "546624",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=546624"
},
{
"category": "external",
"summary": "547251",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=547251"
},
{
"category": "external",
"summary": "547762",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=547762"
},
{
"category": "external",
"summary": "547980",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=547980"
},
{
"category": "external",
"summary": "548079",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=548079"
},
{
"category": "external",
"summary": "548565",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=548565"
},
{
"category": "external",
"summary": "549397",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=549397"
},
{
"category": "external",
"summary": "549460",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=549460"
},
{
"category": "external",
"summary": "549465",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=549465"
},
{
"category": "external",
"summary": "549750",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=549750"
},
{
"category": "external",
"summary": "550148",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=550148"
},
{
"category": "external",
"summary": "552675",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=552675"
},
{
"category": "external",
"summary": "553324",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=553324"
},
{
"category": "external",
"summary": "553447",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=553447"
},
{
"category": "external",
"summary": "553670",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=553670"
},
{
"category": "external",
"summary": "554078",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=554078"
},
{
"category": "external",
"summary": "554545",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=554545"
},
{
"category": "external",
"summary": "555120",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=555120"
},
{
"category": "external",
"summary": "555171",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=555171"
},
{
"category": "external",
"summary": "555604",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=555604"
},
{
"category": "external",
"summary": "557095",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=557095"
},
{
"category": "external",
"summary": "557109",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=557109"
},
{
"category": "external",
"summary": "557172",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=557172"
},
{
"category": "external",
"summary": "557792",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=557792"
},
{
"category": "external",
"summary": "557974",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=557974"
},
{
"category": "external",
"summary": "558809",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=558809"
},
{
"category": "external",
"summary": "559329",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=559329"
},
{
"category": "external",
"summary": "559410",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=559410"
},
{
"category": "external",
"summary": "559711",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=559711"
},
{
"category": "external",
"summary": "560944",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=560944"
},
{
"category": "external",
"summary": "561076",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=561076"
},
{
"category": "external",
"summary": "561322",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=561322"
},
{
"category": "external",
"summary": "561578",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=561578"
},
{
"category": "external",
"summary": "562006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=562006"
},
{
"category": "external",
"summary": "562947",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=562947"
},
{
"category": "external",
"summary": "564145",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=564145"
},
{
"category": "external",
"summary": "564399",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=564399"
},
{
"category": "external",
"summary": "564506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=564506"
},
{
"category": "external",
"summary": "565494",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=565494"
},
{
"category": "external",
"summary": "565594",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=565594"
},
{
"category": "external",
"summary": "565964",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=565964"
},
{
"category": "external",
"summary": "565965",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=565965"
},
{
"category": "external",
"summary": "566016",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=566016"
},
{
"category": "external",
"summary": "566221",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=566221"
},
{
"category": "external",
"summary": "566696",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=566696"
},
{
"category": "external",
"summary": "568040",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=568040"
},
{
"category": "external",
"summary": "568153",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=568153"
},
{
"category": "external",
"summary": "569610",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=569610"
},
{
"category": "external",
"summary": "570814",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=570814"
},
{
"category": "external",
"summary": "570863",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=570863"
},
{
"category": "external",
"summary": "571818",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=571818"
},
{
"category": "external",
"summary": "573098",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=573098"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0178.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Enterprise Linux 5.5 kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-11-21T17:35:59+00:00",
"generator": {
"date": "2025-11-21T17:35:59+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2010:0178",
"initial_release_date": "2010-03-29T12:00:00+00:00",
"revision_history": [
{
"date": "2010-03-29T12:00:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2010-03-29T08:18:21+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:35:59+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-194.el5.i686",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-194.el5.i686",
"product_id": "kernel-xen-debuginfo-0:2.6.18-194.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-194.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-devel-0:2.6.18-194.el5.i686",
"product": {
"name": "kernel-PAE-devel-0:2.6.18-194.el5.i686",
"product_id": "kernel-PAE-devel-0:2.6.18-194.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-194.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-194.el5.i686",
"product": {
"name": "kernel-0:2.6.18-194.el5.i686",
"product_id": "kernel-0:2.6.18-194.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-194.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-194.el5.i686",
"product": {
"name": "kernel-xen-0:2.6.18-194.el5.i686",
"product_id": "kernel-xen-0:2.6.18-194.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-194.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-debuginfo-0:2.6.18-194.el5.i686",
"product": {
"name": "kernel-PAE-debuginfo-0:2.6.18-194.el5.i686",
"product_id": "kernel-PAE-debuginfo-0:2.6.18-194.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-194.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-194.el5.i686",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-194.el5.i686",
"product_id": "kernel-debuginfo-common-0:2.6.18-194.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-194.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-194.el5.i686",
"product": {
"name": "kernel-debuginfo-0:2.6.18-194.el5.i686",
"product_id": "kernel-debuginfo-0:2.6.18-194.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-194.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-194.el5.i686",
"product": {
"name": "kernel-devel-0:2.6.18-194.el5.i686",
"product_id": "kernel-devel-0:2.6.18-194.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-194.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-194.el5.i686",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-194.el5.i686",
"product_id": "kernel-debug-debuginfo-0:2.6.18-194.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-194.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-194.el5.i686",
"product": {
"name": "kernel-xen-devel-0:2.6.18-194.el5.i686",
"product_id": "kernel-xen-devel-0:2.6.18-194.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-194.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-0:2.6.18-194.el5.i686",
"product": {
"name": "kernel-PAE-0:2.6.18-194.el5.i686",
"product_id": "kernel-PAE-0:2.6.18-194.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-194.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-194.el5.i686",
"product": {
"name": "kernel-debug-0:2.6.18-194.el5.i686",
"product_id": "kernel-debug-0:2.6.18-194.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-194.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-194.el5.i686",
"product": {
"name": "kernel-debug-devel-0:2.6.18-194.el5.i686",
"product_id": "kernel-debug-devel-0:2.6.18-194.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-194.el5?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-194.el5.i386",
"product": {
"name": "kernel-headers-0:2.6.18-194.el5.i386",
"product_id": "kernel-headers-0:2.6.18-194.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-194.el5?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-194.el5.x86_64",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-194.el5.x86_64",
"product_id": "kernel-xen-debuginfo-0:2.6.18-194.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-194.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-194.el5.x86_64",
"product": {
"name": "kernel-0:2.6.18-194.el5.x86_64",
"product_id": "kernel-0:2.6.18-194.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-194.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-194.el5.x86_64",
"product": {
"name": "kernel-xen-0:2.6.18-194.el5.x86_64",
"product_id": "kernel-xen-0:2.6.18-194.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-194.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-194.el5.x86_64",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-194.el5.x86_64",
"product_id": "kernel-debuginfo-common-0:2.6.18-194.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-194.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-194.el5.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.18-194.el5.x86_64",
"product_id": "kernel-debuginfo-0:2.6.18-194.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-194.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-194.el5.x86_64",
"product": {
"name": "kernel-devel-0:2.6.18-194.el5.x86_64",
"product_id": "kernel-devel-0:2.6.18-194.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-194.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-194.el5.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-194.el5.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.18-194.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-194.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-194.el5.x86_64",
"product": {
"name": "kernel-headers-0:2.6.18-194.el5.x86_64",
"product_id": "kernel-headers-0:2.6.18-194.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-194.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-194.el5.x86_64",
"product": {
"name": "kernel-xen-devel-0:2.6.18-194.el5.x86_64",
"product_id": "kernel-xen-devel-0:2.6.18-194.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-194.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-194.el5.x86_64",
"product": {
"name": "kernel-debug-0:2.6.18-194.el5.x86_64",
"product_id": "kernel-debug-0:2.6.18-194.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-194.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-194.el5.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.18-194.el5.x86_64",
"product_id": "kernel-debug-devel-0:2.6.18-194.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-194.el5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.18-194.el5.src",
"product": {
"name": "kernel-0:2.6.18-194.el5.src",
"product_id": "kernel-0:2.6.18-194.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-194.el5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:2.6.18-194.el5.noarch",
"product": {
"name": "kernel-doc-0:2.6.18-194.el5.noarch",
"product_id": "kernel-doc-0:2.6.18-194.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.18-194.el5?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-194.el5.ia64",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-194.el5.ia64",
"product_id": "kernel-xen-debuginfo-0:2.6.18-194.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-194.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-194.el5.ia64",
"product": {
"name": "kernel-0:2.6.18-194.el5.ia64",
"product_id": "kernel-0:2.6.18-194.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-194.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-194.el5.ia64",
"product": {
"name": "kernel-xen-0:2.6.18-194.el5.ia64",
"product_id": "kernel-xen-0:2.6.18-194.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-194.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-194.el5.ia64",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-194.el5.ia64",
"product_id": "kernel-debuginfo-common-0:2.6.18-194.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-194.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-194.el5.ia64",
"product": {
"name": "kernel-debuginfo-0:2.6.18-194.el5.ia64",
"product_id": "kernel-debuginfo-0:2.6.18-194.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-194.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-194.el5.ia64",
"product": {
"name": "kernel-devel-0:2.6.18-194.el5.ia64",
"product_id": "kernel-devel-0:2.6.18-194.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-194.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-194.el5.ia64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-194.el5.ia64",
"product_id": "kernel-debug-debuginfo-0:2.6.18-194.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-194.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-194.el5.ia64",
"product": {
"name": "kernel-headers-0:2.6.18-194.el5.ia64",
"product_id": "kernel-headers-0:2.6.18-194.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-194.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-194.el5.ia64",
"product": {
"name": "kernel-xen-devel-0:2.6.18-194.el5.ia64",
"product_id": "kernel-xen-devel-0:2.6.18-194.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-194.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-194.el5.ia64",
"product": {
"name": "kernel-debug-0:2.6.18-194.el5.ia64",
"product_id": "kernel-debug-0:2.6.18-194.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-194.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-194.el5.ia64",
"product": {
"name": "kernel-debug-devel-0:2.6.18-194.el5.ia64",
"product_id": "kernel-debug-devel-0:2.6.18-194.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-194.el5?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.18-194.el5.ppc64",
"product": {
"name": "kernel-0:2.6.18-194.el5.ppc64",
"product_id": "kernel-0:2.6.18-194.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-194.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:2.6.18-194.el5.ppc64",
"product": {
"name": "kernel-kdump-debuginfo-0:2.6.18-194.el5.ppc64",
"product_id": "kernel-kdump-debuginfo-0:2.6.18-194.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-194.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-194.el5.ppc64",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-194.el5.ppc64",
"product_id": "kernel-debuginfo-common-0:2.6.18-194.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-194.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-194.el5.ppc64",
"product": {
"name": "kernel-debuginfo-0:2.6.18-194.el5.ppc64",
"product_id": "kernel-debuginfo-0:2.6.18-194.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-194.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-194.el5.ppc64",
"product": {
"name": "kernel-devel-0:2.6.18-194.el5.ppc64",
"product_id": "kernel-devel-0:2.6.18-194.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-194.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-194.el5.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-194.el5.ppc64",
"product_id": "kernel-debug-debuginfo-0:2.6.18-194.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-194.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-194.el5.ppc64",
"product": {
"name": "kernel-headers-0:2.6.18-194.el5.ppc64",
"product_id": "kernel-headers-0:2.6.18-194.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-194.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:2.6.18-194.el5.ppc64",
"product": {
"name": "kernel-kdump-0:2.6.18-194.el5.ppc64",
"product_id": "kernel-kdump-0:2.6.18-194.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-194.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-194.el5.ppc64",
"product": {
"name": "kernel-debug-0:2.6.18-194.el5.ppc64",
"product_id": "kernel-debug-0:2.6.18-194.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-194.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:2.6.18-194.el5.ppc64",
"product": {
"name": "kernel-kdump-devel-0:2.6.18-194.el5.ppc64",
"product_id": "kernel-kdump-devel-0:2.6.18-194.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-194.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-194.el5.ppc64",
"product": {
"name": "kernel-debug-devel-0:2.6.18-194.el5.ppc64",
"product_id": "kernel-debug-devel-0:2.6.18-194.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-194.el5?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-194.el5.ppc",
"product": {
"name": "kernel-headers-0:2.6.18-194.el5.ppc",
"product_id": "kernel-headers-0:2.6.18-194.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-194.el5?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.18-194.el5.s390x",
"product": {
"name": "kernel-0:2.6.18-194.el5.s390x",
"product_id": "kernel-0:2.6.18-194.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-194.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:2.6.18-194.el5.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:2.6.18-194.el5.s390x",
"product_id": "kernel-kdump-debuginfo-0:2.6.18-194.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-194.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-194.el5.s390x",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-194.el5.s390x",
"product_id": "kernel-debuginfo-common-0:2.6.18-194.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-194.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-194.el5.s390x",
"product": {
"name": "kernel-debuginfo-0:2.6.18-194.el5.s390x",
"product_id": "kernel-debuginfo-0:2.6.18-194.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-194.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-194.el5.s390x",
"product": {
"name": "kernel-devel-0:2.6.18-194.el5.s390x",
"product_id": "kernel-devel-0:2.6.18-194.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-194.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-194.el5.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-194.el5.s390x",
"product_id": "kernel-debug-debuginfo-0:2.6.18-194.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-194.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-194.el5.s390x",
"product": {
"name": "kernel-headers-0:2.6.18-194.el5.s390x",
"product_id": "kernel-headers-0:2.6.18-194.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-194.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:2.6.18-194.el5.s390x",
"product": {
"name": "kernel-kdump-0:2.6.18-194.el5.s390x",
"product_id": "kernel-kdump-0:2.6.18-194.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-194.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-194.el5.s390x",
"product": {
"name": "kernel-debug-0:2.6.18-194.el5.s390x",
"product_id": "kernel-debug-0:2.6.18-194.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-194.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:2.6.18-194.el5.s390x",
"product": {
"name": "kernel-kdump-devel-0:2.6.18-194.el5.s390x",
"product_id": "kernel-kdump-devel-0:2.6.18-194.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-194.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-194.el5.s390x",
"product": {
"name": "kernel-debug-devel-0:2.6.18-194.el5.s390x",
"product_id": "kernel-debug-devel-0:2.6.18-194.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-194.el5?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-194.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-194.el5.i686"
},
"product_reference": "kernel-0:2.6.18-194.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-194.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-194.el5.ia64"
},
"product_reference": "kernel-0:2.6.18-194.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-194.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-194.el5.ppc64"
},
"product_reference": "kernel-0:2.6.18-194.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-194.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-194.el5.s390x"
},
"product_reference": "kernel-0:2.6.18-194.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-194.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-194.el5.src"
},
"product_reference": "kernel-0:2.6.18-194.el5.src",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-194.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-194.el5.x86_64"
},
"product_reference": "kernel-0:2.6.18-194.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-0:2.6.18-194.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-PAE-0:2.6.18-194.el5.i686"
},
"product_reference": "kernel-PAE-0:2.6.18-194.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-debuginfo-0:2.6.18-194.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-PAE-debuginfo-0:2.6.18-194.el5.i686"
},
"product_reference": "kernel-PAE-debuginfo-0:2.6.18-194.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-devel-0:2.6.18-194.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-PAE-devel-0:2.6.18-194.el5.i686"
},
"product_reference": "kernel-PAE-devel-0:2.6.18-194.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-194.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-0:2.6.18-194.el5.i686"
},
"product_reference": "kernel-debug-0:2.6.18-194.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-194.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-0:2.6.18-194.el5.ia64"
},
"product_reference": "kernel-debug-0:2.6.18-194.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-194.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-0:2.6.18-194.el5.ppc64"
},
"product_reference": "kernel-debug-0:2.6.18-194.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-194.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-0:2.6.18-194.el5.s390x"
},
"product_reference": "kernel-debug-0:2.6.18-194.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-194.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-0:2.6.18-194.el5.x86_64"
},
"product_reference": "kernel-debug-0:2.6.18-194.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-194.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-194.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-194.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.ia64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-194.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-194.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-194.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-194.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-194.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-194.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-194.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-194.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-devel-0:2.6.18-194.el5.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.18-194.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-194.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-devel-0:2.6.18-194.el5.ia64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-194.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-194.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-devel-0:2.6.18-194.el5.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-194.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-194.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-devel-0:2.6.18-194.el5.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.18-194.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-194.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-devel-0:2.6.18-194.el5.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-194.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-194.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-0:2.6.18-194.el5.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.18-194.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-194.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-0:2.6.18-194.el5.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-194.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-194.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-0:2.6.18-194.el5.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-194.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-194.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-0:2.6.18-194.el5.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.18-194.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-194.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-0:2.6.18-194.el5.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-194.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-194.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-common-0:2.6.18-194.el5.i686"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-194.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-194.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-common-0:2.6.18-194.el5.ia64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-194.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-194.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-common-0:2.6.18-194.el5.ppc64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-194.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-194.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-common-0:2.6.18-194.el5.s390x"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-194.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-194.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-common-0:2.6.18-194.el5.x86_64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-194.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-194.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-devel-0:2.6.18-194.el5.i686"
},
"product_reference": "kernel-devel-0:2.6.18-194.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-194.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-devel-0:2.6.18-194.el5.ia64"
},
"product_reference": "kernel-devel-0:2.6.18-194.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-194.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-devel-0:2.6.18-194.el5.ppc64"
},
"product_reference": "kernel-devel-0:2.6.18-194.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-194.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-devel-0:2.6.18-194.el5.s390x"
},
"product_reference": "kernel-devel-0:2.6.18-194.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-194.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-devel-0:2.6.18-194.el5.x86_64"
},
"product_reference": "kernel-devel-0:2.6.18-194.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.18-194.el5.noarch as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-doc-0:2.6.18-194.el5.noarch"
},
"product_reference": "kernel-doc-0:2.6.18-194.el5.noarch",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-194.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-194.el5.i386"
},
"product_reference": "kernel-headers-0:2.6.18-194.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-194.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-194.el5.ia64"
},
"product_reference": "kernel-headers-0:2.6.18-194.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-194.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-194.el5.ppc"
},
"product_reference": "kernel-headers-0:2.6.18-194.el5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-194.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-194.el5.ppc64"
},
"product_reference": "kernel-headers-0:2.6.18-194.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-194.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-194.el5.s390x"
},
"product_reference": "kernel-headers-0:2.6.18-194.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-194.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-194.el5.x86_64"
},
"product_reference": "kernel-headers-0:2.6.18-194.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.18-194.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-kdump-0:2.6.18-194.el5.ppc64"
},
"product_reference": "kernel-kdump-0:2.6.18-194.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.18-194.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-kdump-0:2.6.18-194.el5.s390x"
},
"product_reference": "kernel-kdump-0:2.6.18-194.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.18-194.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-194.el5.ppc64"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.18-194.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.18-194.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-194.el5.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.18-194.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.18-194.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-kdump-devel-0:2.6.18-194.el5.ppc64"
},
"product_reference": "kernel-kdump-devel-0:2.6.18-194.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.18-194.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-kdump-devel-0:2.6.18-194.el5.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.18-194.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-194.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-0:2.6.18-194.el5.i686"
},
"product_reference": "kernel-xen-0:2.6.18-194.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-194.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-0:2.6.18-194.el5.ia64"
},
"product_reference": "kernel-xen-0:2.6.18-194.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-194.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-0:2.6.18-194.el5.x86_64"
},
"product_reference": "kernel-xen-0:2.6.18-194.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-194.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-194.el5.i686"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-194.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-194.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-194.el5.ia64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-194.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-194.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-194.el5.x86_64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-194.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-194.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-devel-0:2.6.18-194.el5.i686"
},
"product_reference": "kernel-xen-devel-0:2.6.18-194.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-194.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-devel-0:2.6.18-194.el5.ia64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-194.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-194.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-devel-0:2.6.18-194.el5.x86_64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-194.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-194.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-194.el5.i686"
},
"product_reference": "kernel-0:2.6.18-194.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-194.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-194.el5.ia64"
},
"product_reference": "kernel-0:2.6.18-194.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-194.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-194.el5.ppc64"
},
"product_reference": "kernel-0:2.6.18-194.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-194.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-194.el5.s390x"
},
"product_reference": "kernel-0:2.6.18-194.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-194.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-194.el5.src"
},
"product_reference": "kernel-0:2.6.18-194.el5.src",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-194.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-194.el5.x86_64"
},
"product_reference": "kernel-0:2.6.18-194.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-0:2.6.18-194.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-PAE-0:2.6.18-194.el5.i686"
},
"product_reference": "kernel-PAE-0:2.6.18-194.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-debuginfo-0:2.6.18-194.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-PAE-debuginfo-0:2.6.18-194.el5.i686"
},
"product_reference": "kernel-PAE-debuginfo-0:2.6.18-194.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-devel-0:2.6.18-194.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-PAE-devel-0:2.6.18-194.el5.i686"
},
"product_reference": "kernel-PAE-devel-0:2.6.18-194.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-194.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-0:2.6.18-194.el5.i686"
},
"product_reference": "kernel-debug-0:2.6.18-194.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-194.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-0:2.6.18-194.el5.ia64"
},
"product_reference": "kernel-debug-0:2.6.18-194.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-194.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-0:2.6.18-194.el5.ppc64"
},
"product_reference": "kernel-debug-0:2.6.18-194.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-194.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-0:2.6.18-194.el5.s390x"
},
"product_reference": "kernel-debug-0:2.6.18-194.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-194.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-0:2.6.18-194.el5.x86_64"
},
"product_reference": "kernel-debug-0:2.6.18-194.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-194.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-194.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-194.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.ia64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-194.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-194.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-194.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-194.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-194.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-194.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-194.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-194.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-devel-0:2.6.18-194.el5.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.18-194.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-194.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-devel-0:2.6.18-194.el5.ia64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-194.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-194.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-devel-0:2.6.18-194.el5.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-194.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-194.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-devel-0:2.6.18-194.el5.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.18-194.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-194.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-devel-0:2.6.18-194.el5.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-194.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-194.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-0:2.6.18-194.el5.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.18-194.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-194.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-0:2.6.18-194.el5.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-194.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-194.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-0:2.6.18-194.el5.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-194.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-194.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-0:2.6.18-194.el5.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.18-194.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-194.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-0:2.6.18-194.el5.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-194.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-194.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-common-0:2.6.18-194.el5.i686"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-194.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-194.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-common-0:2.6.18-194.el5.ia64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-194.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-194.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-common-0:2.6.18-194.el5.ppc64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-194.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-194.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-common-0:2.6.18-194.el5.s390x"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-194.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-194.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-common-0:2.6.18-194.el5.x86_64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-194.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-194.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-devel-0:2.6.18-194.el5.i686"
},
"product_reference": "kernel-devel-0:2.6.18-194.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-194.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-devel-0:2.6.18-194.el5.ia64"
},
"product_reference": "kernel-devel-0:2.6.18-194.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-194.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-devel-0:2.6.18-194.el5.ppc64"
},
"product_reference": "kernel-devel-0:2.6.18-194.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-194.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-devel-0:2.6.18-194.el5.s390x"
},
"product_reference": "kernel-devel-0:2.6.18-194.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-194.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-devel-0:2.6.18-194.el5.x86_64"
},
"product_reference": "kernel-devel-0:2.6.18-194.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.18-194.el5.noarch as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-doc-0:2.6.18-194.el5.noarch"
},
"product_reference": "kernel-doc-0:2.6.18-194.el5.noarch",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-194.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-194.el5.i386"
},
"product_reference": "kernel-headers-0:2.6.18-194.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-194.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-194.el5.ia64"
},
"product_reference": "kernel-headers-0:2.6.18-194.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-194.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-194.el5.ppc"
},
"product_reference": "kernel-headers-0:2.6.18-194.el5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-194.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-194.el5.ppc64"
},
"product_reference": "kernel-headers-0:2.6.18-194.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-194.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-194.el5.s390x"
},
"product_reference": "kernel-headers-0:2.6.18-194.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-194.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-194.el5.x86_64"
},
"product_reference": "kernel-headers-0:2.6.18-194.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.18-194.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-kdump-0:2.6.18-194.el5.ppc64"
},
"product_reference": "kernel-kdump-0:2.6.18-194.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.18-194.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-kdump-0:2.6.18-194.el5.s390x"
},
"product_reference": "kernel-kdump-0:2.6.18-194.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.18-194.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-194.el5.ppc64"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.18-194.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.18-194.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-194.el5.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.18-194.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.18-194.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-kdump-devel-0:2.6.18-194.el5.ppc64"
},
"product_reference": "kernel-kdump-devel-0:2.6.18-194.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.18-194.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-kdump-devel-0:2.6.18-194.el5.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.18-194.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-194.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-0:2.6.18-194.el5.i686"
},
"product_reference": "kernel-xen-0:2.6.18-194.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-194.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-0:2.6.18-194.el5.ia64"
},
"product_reference": "kernel-xen-0:2.6.18-194.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-194.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-0:2.6.18-194.el5.x86_64"
},
"product_reference": "kernel-xen-0:2.6.18-194.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-194.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-194.el5.i686"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-194.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-194.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-194.el5.ia64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-194.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-194.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-194.el5.x86_64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-194.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-194.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-devel-0:2.6.18-194.el5.i686"
},
"product_reference": "kernel-xen-devel-0:2.6.18-194.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-194.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-devel-0:2.6.18-194.el5.ia64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-194.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-194.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-devel-0:2.6.18-194.el5.x86_64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-194.el5.x86_64",
"relates_to_product_reference": "5Server"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-4027",
"cwe": {
"id": "CWE-617",
"name": "Reachable Assertion"
},
"discovery_date": "2009-11-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "541149"
}
],
"notes": [
{
"category": "description",
"text": "Race condition in the mac80211 subsystem in the Linux kernel before 2.6.32-rc8-next-20091201 allows remote attackers to cause a denial of service (system crash) via a Delete Block ACK (aka DELBA) packet that triggers a certain state change in the absence of an aggregation session.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mac80211: fix spurious delBA handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 3 and 4 as they do not have support for the mac80211 framework.\n\nIt did not affect the version of the Linux kernel as shipped with Red Hat Enterprise MRG as they do not include the upstream patch that introduced this vulnerability.\n\nA future update will address this flaw in Red Hat Enterprise Linux 5.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-194.el5.i686",
"5Client:kernel-0:2.6.18-194.el5.ia64",
"5Client:kernel-0:2.6.18-194.el5.ppc64",
"5Client:kernel-0:2.6.18-194.el5.s390x",
"5Client:kernel-0:2.6.18-194.el5.src",
"5Client:kernel-0:2.6.18-194.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-194.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-194.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-194.el5.i686",
"5Client:kernel-debug-0:2.6.18-194.el5.i686",
"5Client:kernel-debug-0:2.6.18-194.el5.ia64",
"5Client:kernel-debug-0:2.6.18-194.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-194.el5.s390x",
"5Client:kernel-debug-0:2.6.18-194.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-194.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-194.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-194.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-194.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-194.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-194.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-194.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-194.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-194.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-194.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-194.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-194.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-194.el5.i686",
"5Client:kernel-devel-0:2.6.18-194.el5.ia64",
"5Client:kernel-devel-0:2.6.18-194.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-194.el5.s390x",
"5Client:kernel-devel-0:2.6.18-194.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-194.el5.noarch",
"5Client:kernel-headers-0:2.6.18-194.el5.i386",
"5Client:kernel-headers-0:2.6.18-194.el5.ia64",
"5Client:kernel-headers-0:2.6.18-194.el5.ppc",
"5Client:kernel-headers-0:2.6.18-194.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-194.el5.s390x",
"5Client:kernel-headers-0:2.6.18-194.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-194.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-194.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-194.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-194.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-194.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-194.el5.s390x",
"5Client:kernel-xen-0:2.6.18-194.el5.i686",
"5Client:kernel-xen-0:2.6.18-194.el5.ia64",
"5Client:kernel-xen-0:2.6.18-194.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-194.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-194.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-194.el5.x86_64",
"5Server:kernel-0:2.6.18-194.el5.i686",
"5Server:kernel-0:2.6.18-194.el5.ia64",
"5Server:kernel-0:2.6.18-194.el5.ppc64",
"5Server:kernel-0:2.6.18-194.el5.s390x",
"5Server:kernel-0:2.6.18-194.el5.src",
"5Server:kernel-0:2.6.18-194.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-194.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-194.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-194.el5.i686",
"5Server:kernel-debug-0:2.6.18-194.el5.i686",
"5Server:kernel-debug-0:2.6.18-194.el5.ia64",
"5Server:kernel-debug-0:2.6.18-194.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-194.el5.s390x",
"5Server:kernel-debug-0:2.6.18-194.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-194.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-194.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-194.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-194.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-194.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-194.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-194.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-194.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-194.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-194.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-194.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-194.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-194.el5.i686",
"5Server:kernel-devel-0:2.6.18-194.el5.ia64",
"5Server:kernel-devel-0:2.6.18-194.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-194.el5.s390x",
"5Server:kernel-devel-0:2.6.18-194.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-194.el5.noarch",
"5Server:kernel-headers-0:2.6.18-194.el5.i386",
"5Server:kernel-headers-0:2.6.18-194.el5.ia64",
"5Server:kernel-headers-0:2.6.18-194.el5.ppc",
"5Server:kernel-headers-0:2.6.18-194.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-194.el5.s390x",
"5Server:kernel-headers-0:2.6.18-194.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-194.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-194.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-194.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-194.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-194.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-194.el5.s390x",
"5Server:kernel-xen-0:2.6.18-194.el5.i686",
"5Server:kernel-xen-0:2.6.18-194.el5.ia64",
"5Server:kernel-xen-0:2.6.18-194.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-194.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-194.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-194.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-4027"
},
{
"category": "external",
"summary": "RHBZ#541149",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=541149"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-4027",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-4027"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4027",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4027"
}
],
"release_date": "2009-11-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-03-29T12:00:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:kernel-0:2.6.18-194.el5.i686",
"5Client:kernel-0:2.6.18-194.el5.ia64",
"5Client:kernel-0:2.6.18-194.el5.ppc64",
"5Client:kernel-0:2.6.18-194.el5.s390x",
"5Client:kernel-0:2.6.18-194.el5.src",
"5Client:kernel-0:2.6.18-194.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-194.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-194.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-194.el5.i686",
"5Client:kernel-debug-0:2.6.18-194.el5.i686",
"5Client:kernel-debug-0:2.6.18-194.el5.ia64",
"5Client:kernel-debug-0:2.6.18-194.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-194.el5.s390x",
"5Client:kernel-debug-0:2.6.18-194.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-194.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-194.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-194.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-194.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-194.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-194.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-194.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-194.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-194.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-194.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-194.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-194.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-194.el5.i686",
"5Client:kernel-devel-0:2.6.18-194.el5.ia64",
"5Client:kernel-devel-0:2.6.18-194.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-194.el5.s390x",
"5Client:kernel-devel-0:2.6.18-194.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-194.el5.noarch",
"5Client:kernel-headers-0:2.6.18-194.el5.i386",
"5Client:kernel-headers-0:2.6.18-194.el5.ia64",
"5Client:kernel-headers-0:2.6.18-194.el5.ppc",
"5Client:kernel-headers-0:2.6.18-194.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-194.el5.s390x",
"5Client:kernel-headers-0:2.6.18-194.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-194.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-194.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-194.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-194.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-194.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-194.el5.s390x",
"5Client:kernel-xen-0:2.6.18-194.el5.i686",
"5Client:kernel-xen-0:2.6.18-194.el5.ia64",
"5Client:kernel-xen-0:2.6.18-194.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-194.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-194.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-194.el5.x86_64",
"5Server:kernel-0:2.6.18-194.el5.i686",
"5Server:kernel-0:2.6.18-194.el5.ia64",
"5Server:kernel-0:2.6.18-194.el5.ppc64",
"5Server:kernel-0:2.6.18-194.el5.s390x",
"5Server:kernel-0:2.6.18-194.el5.src",
"5Server:kernel-0:2.6.18-194.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-194.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-194.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-194.el5.i686",
"5Server:kernel-debug-0:2.6.18-194.el5.i686",
"5Server:kernel-debug-0:2.6.18-194.el5.ia64",
"5Server:kernel-debug-0:2.6.18-194.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-194.el5.s390x",
"5Server:kernel-debug-0:2.6.18-194.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-194.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-194.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-194.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-194.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-194.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-194.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-194.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-194.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-194.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-194.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-194.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-194.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-194.el5.i686",
"5Server:kernel-devel-0:2.6.18-194.el5.ia64",
"5Server:kernel-devel-0:2.6.18-194.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-194.el5.s390x",
"5Server:kernel-devel-0:2.6.18-194.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-194.el5.noarch",
"5Server:kernel-headers-0:2.6.18-194.el5.i386",
"5Server:kernel-headers-0:2.6.18-194.el5.ia64",
"5Server:kernel-headers-0:2.6.18-194.el5.ppc",
"5Server:kernel-headers-0:2.6.18-194.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-194.el5.s390x",
"5Server:kernel-headers-0:2.6.18-194.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-194.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-194.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-194.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-194.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-194.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-194.el5.s390x",
"5Server:kernel-xen-0:2.6.18-194.el5.i686",
"5Server:kernel-xen-0:2.6.18-194.el5.ia64",
"5Server:kernel-xen-0:2.6.18-194.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-194.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-194.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-194.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0178"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"products": [
"5Client:kernel-0:2.6.18-194.el5.i686",
"5Client:kernel-0:2.6.18-194.el5.ia64",
"5Client:kernel-0:2.6.18-194.el5.ppc64",
"5Client:kernel-0:2.6.18-194.el5.s390x",
"5Client:kernel-0:2.6.18-194.el5.src",
"5Client:kernel-0:2.6.18-194.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-194.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-194.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-194.el5.i686",
"5Client:kernel-debug-0:2.6.18-194.el5.i686",
"5Client:kernel-debug-0:2.6.18-194.el5.ia64",
"5Client:kernel-debug-0:2.6.18-194.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-194.el5.s390x",
"5Client:kernel-debug-0:2.6.18-194.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-194.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-194.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-194.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-194.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-194.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-194.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-194.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-194.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-194.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-194.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-194.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-194.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-194.el5.i686",
"5Client:kernel-devel-0:2.6.18-194.el5.ia64",
"5Client:kernel-devel-0:2.6.18-194.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-194.el5.s390x",
"5Client:kernel-devel-0:2.6.18-194.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-194.el5.noarch",
"5Client:kernel-headers-0:2.6.18-194.el5.i386",
"5Client:kernel-headers-0:2.6.18-194.el5.ia64",
"5Client:kernel-headers-0:2.6.18-194.el5.ppc",
"5Client:kernel-headers-0:2.6.18-194.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-194.el5.s390x",
"5Client:kernel-headers-0:2.6.18-194.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-194.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-194.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-194.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-194.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-194.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-194.el5.s390x",
"5Client:kernel-xen-0:2.6.18-194.el5.i686",
"5Client:kernel-xen-0:2.6.18-194.el5.ia64",
"5Client:kernel-xen-0:2.6.18-194.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-194.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-194.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-194.el5.x86_64",
"5Server:kernel-0:2.6.18-194.el5.i686",
"5Server:kernel-0:2.6.18-194.el5.ia64",
"5Server:kernel-0:2.6.18-194.el5.ppc64",
"5Server:kernel-0:2.6.18-194.el5.s390x",
"5Server:kernel-0:2.6.18-194.el5.src",
"5Server:kernel-0:2.6.18-194.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-194.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-194.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-194.el5.i686",
"5Server:kernel-debug-0:2.6.18-194.el5.i686",
"5Server:kernel-debug-0:2.6.18-194.el5.ia64",
"5Server:kernel-debug-0:2.6.18-194.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-194.el5.s390x",
"5Server:kernel-debug-0:2.6.18-194.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-194.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-194.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-194.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-194.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-194.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-194.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-194.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-194.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-194.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-194.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-194.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-194.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-194.el5.i686",
"5Server:kernel-devel-0:2.6.18-194.el5.ia64",
"5Server:kernel-devel-0:2.6.18-194.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-194.el5.s390x",
"5Server:kernel-devel-0:2.6.18-194.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-194.el5.noarch",
"5Server:kernel-headers-0:2.6.18-194.el5.i386",
"5Server:kernel-headers-0:2.6.18-194.el5.ia64",
"5Server:kernel-headers-0:2.6.18-194.el5.ppc",
"5Server:kernel-headers-0:2.6.18-194.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-194.el5.s390x",
"5Server:kernel-headers-0:2.6.18-194.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-194.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-194.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-194.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-194.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-194.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-194.el5.s390x",
"5Server:kernel-xen-0:2.6.18-194.el5.i686",
"5Server:kernel-xen-0:2.6.18-194.el5.ia64",
"5Server:kernel-xen-0:2.6.18-194.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-194.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-194.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-194.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: mac80211: fix spurious delBA handling"
},
{
"cve": "CVE-2009-4307",
"discovery_date": "2009-12-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "547251"
}
],
"notes": [
{
"category": "description",
"text": "The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 2.6.32-git6 allows user-assisted remote attackers to cause a denial of service (divide-by-zero error and panic) via a malformed ext4 filesystem containing a super block with a large FLEX_BG group size (aka s_log_groups_per_flex value).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ext4: avoid divide by zero when trying to mount a corrupted file system",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Linux kernel packages as shipped with Red Hat Enterprise Linux 3, 4 and Red Hat Enterprise MRG do not include support for EXT4, and therefore are not affected by this issue.\n\nA future kernel update for Red Hat Enterprise Linux 5 will address this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-194.el5.i686",
"5Client:kernel-0:2.6.18-194.el5.ia64",
"5Client:kernel-0:2.6.18-194.el5.ppc64",
"5Client:kernel-0:2.6.18-194.el5.s390x",
"5Client:kernel-0:2.6.18-194.el5.src",
"5Client:kernel-0:2.6.18-194.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-194.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-194.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-194.el5.i686",
"5Client:kernel-debug-0:2.6.18-194.el5.i686",
"5Client:kernel-debug-0:2.6.18-194.el5.ia64",
"5Client:kernel-debug-0:2.6.18-194.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-194.el5.s390x",
"5Client:kernel-debug-0:2.6.18-194.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-194.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-194.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-194.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-194.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-194.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-194.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-194.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-194.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-194.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-194.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-194.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-194.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-194.el5.i686",
"5Client:kernel-devel-0:2.6.18-194.el5.ia64",
"5Client:kernel-devel-0:2.6.18-194.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-194.el5.s390x",
"5Client:kernel-devel-0:2.6.18-194.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-194.el5.noarch",
"5Client:kernel-headers-0:2.6.18-194.el5.i386",
"5Client:kernel-headers-0:2.6.18-194.el5.ia64",
"5Client:kernel-headers-0:2.6.18-194.el5.ppc",
"5Client:kernel-headers-0:2.6.18-194.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-194.el5.s390x",
"5Client:kernel-headers-0:2.6.18-194.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-194.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-194.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-194.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-194.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-194.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-194.el5.s390x",
"5Client:kernel-xen-0:2.6.18-194.el5.i686",
"5Client:kernel-xen-0:2.6.18-194.el5.ia64",
"5Client:kernel-xen-0:2.6.18-194.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-194.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-194.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-194.el5.x86_64",
"5Server:kernel-0:2.6.18-194.el5.i686",
"5Server:kernel-0:2.6.18-194.el5.ia64",
"5Server:kernel-0:2.6.18-194.el5.ppc64",
"5Server:kernel-0:2.6.18-194.el5.s390x",
"5Server:kernel-0:2.6.18-194.el5.src",
"5Server:kernel-0:2.6.18-194.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-194.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-194.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-194.el5.i686",
"5Server:kernel-debug-0:2.6.18-194.el5.i686",
"5Server:kernel-debug-0:2.6.18-194.el5.ia64",
"5Server:kernel-debug-0:2.6.18-194.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-194.el5.s390x",
"5Server:kernel-debug-0:2.6.18-194.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-194.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-194.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-194.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-194.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-194.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-194.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-194.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-194.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-194.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-194.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-194.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-194.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-194.el5.i686",
"5Server:kernel-devel-0:2.6.18-194.el5.ia64",
"5Server:kernel-devel-0:2.6.18-194.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-194.el5.s390x",
"5Server:kernel-devel-0:2.6.18-194.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-194.el5.noarch",
"5Server:kernel-headers-0:2.6.18-194.el5.i386",
"5Server:kernel-headers-0:2.6.18-194.el5.ia64",
"5Server:kernel-headers-0:2.6.18-194.el5.ppc",
"5Server:kernel-headers-0:2.6.18-194.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-194.el5.s390x",
"5Server:kernel-headers-0:2.6.18-194.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-194.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-194.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-194.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-194.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-194.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-194.el5.s390x",
"5Server:kernel-xen-0:2.6.18-194.el5.i686",
"5Server:kernel-xen-0:2.6.18-194.el5.ia64",
"5Server:kernel-xen-0:2.6.18-194.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-194.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-194.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-194.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-4307"
},
{
"category": "external",
"summary": "RHBZ#547251",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=547251"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-4307",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-4307"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4307",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4307"
}
],
"release_date": "2009-11-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-03-29T12:00:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:kernel-0:2.6.18-194.el5.i686",
"5Client:kernel-0:2.6.18-194.el5.ia64",
"5Client:kernel-0:2.6.18-194.el5.ppc64",
"5Client:kernel-0:2.6.18-194.el5.s390x",
"5Client:kernel-0:2.6.18-194.el5.src",
"5Client:kernel-0:2.6.18-194.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-194.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-194.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-194.el5.i686",
"5Client:kernel-debug-0:2.6.18-194.el5.i686",
"5Client:kernel-debug-0:2.6.18-194.el5.ia64",
"5Client:kernel-debug-0:2.6.18-194.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-194.el5.s390x",
"5Client:kernel-debug-0:2.6.18-194.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-194.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-194.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-194.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-194.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-194.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-194.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-194.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-194.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-194.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-194.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-194.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-194.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-194.el5.i686",
"5Client:kernel-devel-0:2.6.18-194.el5.ia64",
"5Client:kernel-devel-0:2.6.18-194.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-194.el5.s390x",
"5Client:kernel-devel-0:2.6.18-194.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-194.el5.noarch",
"5Client:kernel-headers-0:2.6.18-194.el5.i386",
"5Client:kernel-headers-0:2.6.18-194.el5.ia64",
"5Client:kernel-headers-0:2.6.18-194.el5.ppc",
"5Client:kernel-headers-0:2.6.18-194.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-194.el5.s390x",
"5Client:kernel-headers-0:2.6.18-194.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-194.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-194.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-194.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-194.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-194.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-194.el5.s390x",
"5Client:kernel-xen-0:2.6.18-194.el5.i686",
"5Client:kernel-xen-0:2.6.18-194.el5.ia64",
"5Client:kernel-xen-0:2.6.18-194.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-194.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-194.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-194.el5.x86_64",
"5Server:kernel-0:2.6.18-194.el5.i686",
"5Server:kernel-0:2.6.18-194.el5.ia64",
"5Server:kernel-0:2.6.18-194.el5.ppc64",
"5Server:kernel-0:2.6.18-194.el5.s390x",
"5Server:kernel-0:2.6.18-194.el5.src",
"5Server:kernel-0:2.6.18-194.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-194.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-194.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-194.el5.i686",
"5Server:kernel-debug-0:2.6.18-194.el5.i686",
"5Server:kernel-debug-0:2.6.18-194.el5.ia64",
"5Server:kernel-debug-0:2.6.18-194.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-194.el5.s390x",
"5Server:kernel-debug-0:2.6.18-194.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-194.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-194.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-194.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-194.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-194.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-194.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-194.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-194.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-194.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-194.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-194.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-194.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-194.el5.i686",
"5Server:kernel-devel-0:2.6.18-194.el5.ia64",
"5Server:kernel-devel-0:2.6.18-194.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-194.el5.s390x",
"5Server:kernel-devel-0:2.6.18-194.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-194.el5.noarch",
"5Server:kernel-headers-0:2.6.18-194.el5.i386",
"5Server:kernel-headers-0:2.6.18-194.el5.ia64",
"5Server:kernel-headers-0:2.6.18-194.el5.ppc",
"5Server:kernel-headers-0:2.6.18-194.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-194.el5.s390x",
"5Server:kernel-headers-0:2.6.18-194.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-194.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-194.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-194.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-194.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-194.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-194.el5.s390x",
"5Server:kernel-xen-0:2.6.18-194.el5.i686",
"5Server:kernel-xen-0:2.6.18-194.el5.ia64",
"5Server:kernel-xen-0:2.6.18-194.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-194.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-194.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-194.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0178"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 4.9,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"products": [
"5Client:kernel-0:2.6.18-194.el5.i686",
"5Client:kernel-0:2.6.18-194.el5.ia64",
"5Client:kernel-0:2.6.18-194.el5.ppc64",
"5Client:kernel-0:2.6.18-194.el5.s390x",
"5Client:kernel-0:2.6.18-194.el5.src",
"5Client:kernel-0:2.6.18-194.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-194.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-194.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-194.el5.i686",
"5Client:kernel-debug-0:2.6.18-194.el5.i686",
"5Client:kernel-debug-0:2.6.18-194.el5.ia64",
"5Client:kernel-debug-0:2.6.18-194.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-194.el5.s390x",
"5Client:kernel-debug-0:2.6.18-194.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-194.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-194.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-194.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-194.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-194.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-194.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-194.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-194.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-194.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-194.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-194.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-194.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-194.el5.i686",
"5Client:kernel-devel-0:2.6.18-194.el5.ia64",
"5Client:kernel-devel-0:2.6.18-194.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-194.el5.s390x",
"5Client:kernel-devel-0:2.6.18-194.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-194.el5.noarch",
"5Client:kernel-headers-0:2.6.18-194.el5.i386",
"5Client:kernel-headers-0:2.6.18-194.el5.ia64",
"5Client:kernel-headers-0:2.6.18-194.el5.ppc",
"5Client:kernel-headers-0:2.6.18-194.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-194.el5.s390x",
"5Client:kernel-headers-0:2.6.18-194.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-194.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-194.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-194.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-194.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-194.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-194.el5.s390x",
"5Client:kernel-xen-0:2.6.18-194.el5.i686",
"5Client:kernel-xen-0:2.6.18-194.el5.ia64",
"5Client:kernel-xen-0:2.6.18-194.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-194.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-194.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-194.el5.x86_64",
"5Server:kernel-0:2.6.18-194.el5.i686",
"5Server:kernel-0:2.6.18-194.el5.ia64",
"5Server:kernel-0:2.6.18-194.el5.ppc64",
"5Server:kernel-0:2.6.18-194.el5.s390x",
"5Server:kernel-0:2.6.18-194.el5.src",
"5Server:kernel-0:2.6.18-194.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-194.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-194.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-194.el5.i686",
"5Server:kernel-debug-0:2.6.18-194.el5.i686",
"5Server:kernel-debug-0:2.6.18-194.el5.ia64",
"5Server:kernel-debug-0:2.6.18-194.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-194.el5.s390x",
"5Server:kernel-debug-0:2.6.18-194.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-194.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-194.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-194.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-194.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-194.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-194.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-194.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-194.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-194.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-194.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-194.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-194.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-194.el5.i686",
"5Server:kernel-devel-0:2.6.18-194.el5.ia64",
"5Server:kernel-devel-0:2.6.18-194.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-194.el5.s390x",
"5Server:kernel-devel-0:2.6.18-194.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-194.el5.noarch",
"5Server:kernel-headers-0:2.6.18-194.el5.i386",
"5Server:kernel-headers-0:2.6.18-194.el5.ia64",
"5Server:kernel-headers-0:2.6.18-194.el5.ppc",
"5Server:kernel-headers-0:2.6.18-194.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-194.el5.s390x",
"5Server:kernel-headers-0:2.6.18-194.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-194.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-194.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-194.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-194.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-194.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-194.el5.s390x",
"5Server:kernel-xen-0:2.6.18-194.el5.i686",
"5Server:kernel-xen-0:2.6.18-194.el5.ia64",
"5Server:kernel-xen-0:2.6.18-194.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-194.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-194.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-194.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: ext4: avoid divide by zero when trying to mount a corrupted file system"
},
{
"cve": "CVE-2010-0727",
"discovery_date": "2010-03-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "570863"
}
],
"notes": [
{
"category": "description",
"text": "The gfs2_lock function in the Linux kernel before 2.6.34-rc1-next-20100312, and the gfs_lock function in the Linux kernel on Red Hat Enterprise Linux (RHEL) 5 and 6, does not properly remove POSIX locks on files that are setgid without group-execute permission, which allows local users to cause a denial of service (BUG and system crash) by locking a file on a (1) GFS or (2) GFS2 filesystem, and then changing this file\u0027s permissions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: bug in GFS/GFS2 locking code leads to dos",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the version of Linux kernel as shipped with Red Hat Enterprise MRG, as it did not include support for the GFS and GFS2 file systems.\n\nFor the GFS issue, it was addressed in Red Hat Enterprise Linux 3 in the gfs package, 4 in the GFS-kernel package, and 5 in the gfs-kmod package, via RHSA-2010:9493, RHSA-2010:9494, RHSA-2010:0291 respectively.\n\nFor the GFS2 issue, it was addressed in Red Hat Enterprise Linux 5 in the kernel package via RHSA-2010:0178.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-194.el5.i686",
"5Client:kernel-0:2.6.18-194.el5.ia64",
"5Client:kernel-0:2.6.18-194.el5.ppc64",
"5Client:kernel-0:2.6.18-194.el5.s390x",
"5Client:kernel-0:2.6.18-194.el5.src",
"5Client:kernel-0:2.6.18-194.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-194.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-194.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-194.el5.i686",
"5Client:kernel-debug-0:2.6.18-194.el5.i686",
"5Client:kernel-debug-0:2.6.18-194.el5.ia64",
"5Client:kernel-debug-0:2.6.18-194.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-194.el5.s390x",
"5Client:kernel-debug-0:2.6.18-194.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-194.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-194.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-194.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-194.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-194.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-194.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-194.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-194.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-194.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-194.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-194.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-194.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-194.el5.i686",
"5Client:kernel-devel-0:2.6.18-194.el5.ia64",
"5Client:kernel-devel-0:2.6.18-194.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-194.el5.s390x",
"5Client:kernel-devel-0:2.6.18-194.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-194.el5.noarch",
"5Client:kernel-headers-0:2.6.18-194.el5.i386",
"5Client:kernel-headers-0:2.6.18-194.el5.ia64",
"5Client:kernel-headers-0:2.6.18-194.el5.ppc",
"5Client:kernel-headers-0:2.6.18-194.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-194.el5.s390x",
"5Client:kernel-headers-0:2.6.18-194.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-194.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-194.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-194.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-194.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-194.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-194.el5.s390x",
"5Client:kernel-xen-0:2.6.18-194.el5.i686",
"5Client:kernel-xen-0:2.6.18-194.el5.ia64",
"5Client:kernel-xen-0:2.6.18-194.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-194.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-194.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-194.el5.x86_64",
"5Server:kernel-0:2.6.18-194.el5.i686",
"5Server:kernel-0:2.6.18-194.el5.ia64",
"5Server:kernel-0:2.6.18-194.el5.ppc64",
"5Server:kernel-0:2.6.18-194.el5.s390x",
"5Server:kernel-0:2.6.18-194.el5.src",
"5Server:kernel-0:2.6.18-194.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-194.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-194.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-194.el5.i686",
"5Server:kernel-debug-0:2.6.18-194.el5.i686",
"5Server:kernel-debug-0:2.6.18-194.el5.ia64",
"5Server:kernel-debug-0:2.6.18-194.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-194.el5.s390x",
"5Server:kernel-debug-0:2.6.18-194.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-194.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-194.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-194.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-194.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-194.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-194.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-194.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-194.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-194.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-194.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-194.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-194.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-194.el5.i686",
"5Server:kernel-devel-0:2.6.18-194.el5.ia64",
"5Server:kernel-devel-0:2.6.18-194.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-194.el5.s390x",
"5Server:kernel-devel-0:2.6.18-194.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-194.el5.noarch",
"5Server:kernel-headers-0:2.6.18-194.el5.i386",
"5Server:kernel-headers-0:2.6.18-194.el5.ia64",
"5Server:kernel-headers-0:2.6.18-194.el5.ppc",
"5Server:kernel-headers-0:2.6.18-194.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-194.el5.s390x",
"5Server:kernel-headers-0:2.6.18-194.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-194.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-194.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-194.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-194.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-194.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-194.el5.s390x",
"5Server:kernel-xen-0:2.6.18-194.el5.i686",
"5Server:kernel-xen-0:2.6.18-194.el5.ia64",
"5Server:kernel-xen-0:2.6.18-194.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-194.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-194.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-194.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2010-0727"
},
{
"category": "external",
"summary": "RHBZ#570863",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=570863"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2010-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0727"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-0727",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0727"
}
],
"release_date": "2010-03-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-03-29T12:00:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:kernel-0:2.6.18-194.el5.i686",
"5Client:kernel-0:2.6.18-194.el5.ia64",
"5Client:kernel-0:2.6.18-194.el5.ppc64",
"5Client:kernel-0:2.6.18-194.el5.s390x",
"5Client:kernel-0:2.6.18-194.el5.src",
"5Client:kernel-0:2.6.18-194.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-194.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-194.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-194.el5.i686",
"5Client:kernel-debug-0:2.6.18-194.el5.i686",
"5Client:kernel-debug-0:2.6.18-194.el5.ia64",
"5Client:kernel-debug-0:2.6.18-194.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-194.el5.s390x",
"5Client:kernel-debug-0:2.6.18-194.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-194.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-194.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-194.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-194.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-194.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-194.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-194.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-194.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-194.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-194.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-194.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-194.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-194.el5.i686",
"5Client:kernel-devel-0:2.6.18-194.el5.ia64",
"5Client:kernel-devel-0:2.6.18-194.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-194.el5.s390x",
"5Client:kernel-devel-0:2.6.18-194.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-194.el5.noarch",
"5Client:kernel-headers-0:2.6.18-194.el5.i386",
"5Client:kernel-headers-0:2.6.18-194.el5.ia64",
"5Client:kernel-headers-0:2.6.18-194.el5.ppc",
"5Client:kernel-headers-0:2.6.18-194.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-194.el5.s390x",
"5Client:kernel-headers-0:2.6.18-194.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-194.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-194.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-194.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-194.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-194.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-194.el5.s390x",
"5Client:kernel-xen-0:2.6.18-194.el5.i686",
"5Client:kernel-xen-0:2.6.18-194.el5.ia64",
"5Client:kernel-xen-0:2.6.18-194.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-194.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-194.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-194.el5.x86_64",
"5Server:kernel-0:2.6.18-194.el5.i686",
"5Server:kernel-0:2.6.18-194.el5.ia64",
"5Server:kernel-0:2.6.18-194.el5.ppc64",
"5Server:kernel-0:2.6.18-194.el5.s390x",
"5Server:kernel-0:2.6.18-194.el5.src",
"5Server:kernel-0:2.6.18-194.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-194.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-194.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-194.el5.i686",
"5Server:kernel-debug-0:2.6.18-194.el5.i686",
"5Server:kernel-debug-0:2.6.18-194.el5.ia64",
"5Server:kernel-debug-0:2.6.18-194.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-194.el5.s390x",
"5Server:kernel-debug-0:2.6.18-194.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-194.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-194.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-194.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-194.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-194.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-194.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-194.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-194.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-194.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-194.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-194.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-194.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-194.el5.i686",
"5Server:kernel-devel-0:2.6.18-194.el5.ia64",
"5Server:kernel-devel-0:2.6.18-194.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-194.el5.s390x",
"5Server:kernel-devel-0:2.6.18-194.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-194.el5.noarch",
"5Server:kernel-headers-0:2.6.18-194.el5.i386",
"5Server:kernel-headers-0:2.6.18-194.el5.ia64",
"5Server:kernel-headers-0:2.6.18-194.el5.ppc",
"5Server:kernel-headers-0:2.6.18-194.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-194.el5.s390x",
"5Server:kernel-headers-0:2.6.18-194.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-194.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-194.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-194.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-194.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-194.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-194.el5.s390x",
"5Server:kernel-xen-0:2.6.18-194.el5.i686",
"5Server:kernel-xen-0:2.6.18-194.el5.ia64",
"5Server:kernel-xen-0:2.6.18-194.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-194.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-194.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-194.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0178"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 4.9,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"products": [
"5Client:kernel-0:2.6.18-194.el5.i686",
"5Client:kernel-0:2.6.18-194.el5.ia64",
"5Client:kernel-0:2.6.18-194.el5.ppc64",
"5Client:kernel-0:2.6.18-194.el5.s390x",
"5Client:kernel-0:2.6.18-194.el5.src",
"5Client:kernel-0:2.6.18-194.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-194.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-194.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-194.el5.i686",
"5Client:kernel-debug-0:2.6.18-194.el5.i686",
"5Client:kernel-debug-0:2.6.18-194.el5.ia64",
"5Client:kernel-debug-0:2.6.18-194.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-194.el5.s390x",
"5Client:kernel-debug-0:2.6.18-194.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-194.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-194.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-194.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-194.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-194.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-194.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-194.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-194.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-194.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-194.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-194.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-194.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-194.el5.i686",
"5Client:kernel-devel-0:2.6.18-194.el5.ia64",
"5Client:kernel-devel-0:2.6.18-194.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-194.el5.s390x",
"5Client:kernel-devel-0:2.6.18-194.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-194.el5.noarch",
"5Client:kernel-headers-0:2.6.18-194.el5.i386",
"5Client:kernel-headers-0:2.6.18-194.el5.ia64",
"5Client:kernel-headers-0:2.6.18-194.el5.ppc",
"5Client:kernel-headers-0:2.6.18-194.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-194.el5.s390x",
"5Client:kernel-headers-0:2.6.18-194.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-194.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-194.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-194.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-194.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-194.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-194.el5.s390x",
"5Client:kernel-xen-0:2.6.18-194.el5.i686",
"5Client:kernel-xen-0:2.6.18-194.el5.ia64",
"5Client:kernel-xen-0:2.6.18-194.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-194.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-194.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-194.el5.x86_64",
"5Server:kernel-0:2.6.18-194.el5.i686",
"5Server:kernel-0:2.6.18-194.el5.ia64",
"5Server:kernel-0:2.6.18-194.el5.ppc64",
"5Server:kernel-0:2.6.18-194.el5.s390x",
"5Server:kernel-0:2.6.18-194.el5.src",
"5Server:kernel-0:2.6.18-194.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-194.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-194.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-194.el5.i686",
"5Server:kernel-debug-0:2.6.18-194.el5.i686",
"5Server:kernel-debug-0:2.6.18-194.el5.ia64",
"5Server:kernel-debug-0:2.6.18-194.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-194.el5.s390x",
"5Server:kernel-debug-0:2.6.18-194.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-194.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-194.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-194.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-194.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-194.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-194.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-194.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-194.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-194.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-194.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-194.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-194.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-194.el5.i686",
"5Server:kernel-devel-0:2.6.18-194.el5.ia64",
"5Server:kernel-devel-0:2.6.18-194.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-194.el5.s390x",
"5Server:kernel-devel-0:2.6.18-194.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-194.el5.noarch",
"5Server:kernel-headers-0:2.6.18-194.el5.i386",
"5Server:kernel-headers-0:2.6.18-194.el5.ia64",
"5Server:kernel-headers-0:2.6.18-194.el5.ppc",
"5Server:kernel-headers-0:2.6.18-194.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-194.el5.s390x",
"5Server:kernel-headers-0:2.6.18-194.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-194.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-194.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-194.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-194.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-194.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-194.el5.s390x",
"5Server:kernel-xen-0:2.6.18-194.el5.i686",
"5Server:kernel-xen-0:2.6.18-194.el5.ia64",
"5Server:kernel-xen-0:2.6.18-194.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-194.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-194.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-194.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: bug in GFS/GFS2 locking code leads to dos"
},
{
"cve": "CVE-2010-1188",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2010-03-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "577711"
}
],
"notes": [
{
"category": "description",
"text": "Use-after-free vulnerability in net/ipv4/tcp_input.c in the Linux kernel 2.6 before 2.6.20, when IPV6_RECVPKTINFO is set on a listening socket, allows remote attackers to cause a denial of service (kernel panic) via a SYN packet while the socket is in a listening (TCP_LISTEN) state, which is not properly handled and causes the skb structure to be freed.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ipv6: skb is unexpectedly freed",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the version of the Linux kernel as shipped with Red Hat Enterprise MRG, as it was fixed since version v2.6.20-rc6.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-194.el5.i686",
"5Client:kernel-0:2.6.18-194.el5.ia64",
"5Client:kernel-0:2.6.18-194.el5.ppc64",
"5Client:kernel-0:2.6.18-194.el5.s390x",
"5Client:kernel-0:2.6.18-194.el5.src",
"5Client:kernel-0:2.6.18-194.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-194.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-194.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-194.el5.i686",
"5Client:kernel-debug-0:2.6.18-194.el5.i686",
"5Client:kernel-debug-0:2.6.18-194.el5.ia64",
"5Client:kernel-debug-0:2.6.18-194.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-194.el5.s390x",
"5Client:kernel-debug-0:2.6.18-194.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-194.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-194.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-194.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-194.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-194.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-194.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-194.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-194.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-194.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-194.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-194.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-194.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-194.el5.i686",
"5Client:kernel-devel-0:2.6.18-194.el5.ia64",
"5Client:kernel-devel-0:2.6.18-194.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-194.el5.s390x",
"5Client:kernel-devel-0:2.6.18-194.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-194.el5.noarch",
"5Client:kernel-headers-0:2.6.18-194.el5.i386",
"5Client:kernel-headers-0:2.6.18-194.el5.ia64",
"5Client:kernel-headers-0:2.6.18-194.el5.ppc",
"5Client:kernel-headers-0:2.6.18-194.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-194.el5.s390x",
"5Client:kernel-headers-0:2.6.18-194.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-194.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-194.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-194.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-194.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-194.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-194.el5.s390x",
"5Client:kernel-xen-0:2.6.18-194.el5.i686",
"5Client:kernel-xen-0:2.6.18-194.el5.ia64",
"5Client:kernel-xen-0:2.6.18-194.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-194.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-194.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-194.el5.x86_64",
"5Server:kernel-0:2.6.18-194.el5.i686",
"5Server:kernel-0:2.6.18-194.el5.ia64",
"5Server:kernel-0:2.6.18-194.el5.ppc64",
"5Server:kernel-0:2.6.18-194.el5.s390x",
"5Server:kernel-0:2.6.18-194.el5.src",
"5Server:kernel-0:2.6.18-194.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-194.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-194.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-194.el5.i686",
"5Server:kernel-debug-0:2.6.18-194.el5.i686",
"5Server:kernel-debug-0:2.6.18-194.el5.ia64",
"5Server:kernel-debug-0:2.6.18-194.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-194.el5.s390x",
"5Server:kernel-debug-0:2.6.18-194.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-194.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-194.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-194.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-194.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-194.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-194.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-194.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-194.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-194.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-194.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-194.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-194.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-194.el5.i686",
"5Server:kernel-devel-0:2.6.18-194.el5.ia64",
"5Server:kernel-devel-0:2.6.18-194.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-194.el5.s390x",
"5Server:kernel-devel-0:2.6.18-194.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-194.el5.noarch",
"5Server:kernel-headers-0:2.6.18-194.el5.i386",
"5Server:kernel-headers-0:2.6.18-194.el5.ia64",
"5Server:kernel-headers-0:2.6.18-194.el5.ppc",
"5Server:kernel-headers-0:2.6.18-194.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-194.el5.s390x",
"5Server:kernel-headers-0:2.6.18-194.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-194.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-194.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-194.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-194.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-194.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-194.el5.s390x",
"5Server:kernel-xen-0:2.6.18-194.el5.i686",
"5Server:kernel-xen-0:2.6.18-194.el5.ia64",
"5Server:kernel-xen-0:2.6.18-194.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-194.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-194.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-194.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2010-1188"
},
{
"category": "external",
"summary": "RHBZ#577711",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=577711"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2010-1188",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1188"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-1188",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1188"
}
],
"release_date": "2007-01-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-03-29T12:00:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:kernel-0:2.6.18-194.el5.i686",
"5Client:kernel-0:2.6.18-194.el5.ia64",
"5Client:kernel-0:2.6.18-194.el5.ppc64",
"5Client:kernel-0:2.6.18-194.el5.s390x",
"5Client:kernel-0:2.6.18-194.el5.src",
"5Client:kernel-0:2.6.18-194.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-194.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-194.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-194.el5.i686",
"5Client:kernel-debug-0:2.6.18-194.el5.i686",
"5Client:kernel-debug-0:2.6.18-194.el5.ia64",
"5Client:kernel-debug-0:2.6.18-194.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-194.el5.s390x",
"5Client:kernel-debug-0:2.6.18-194.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-194.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-194.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-194.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-194.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-194.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-194.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-194.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-194.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-194.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-194.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-194.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-194.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-194.el5.i686",
"5Client:kernel-devel-0:2.6.18-194.el5.ia64",
"5Client:kernel-devel-0:2.6.18-194.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-194.el5.s390x",
"5Client:kernel-devel-0:2.6.18-194.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-194.el5.noarch",
"5Client:kernel-headers-0:2.6.18-194.el5.i386",
"5Client:kernel-headers-0:2.6.18-194.el5.ia64",
"5Client:kernel-headers-0:2.6.18-194.el5.ppc",
"5Client:kernel-headers-0:2.6.18-194.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-194.el5.s390x",
"5Client:kernel-headers-0:2.6.18-194.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-194.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-194.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-194.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-194.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-194.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-194.el5.s390x",
"5Client:kernel-xen-0:2.6.18-194.el5.i686",
"5Client:kernel-xen-0:2.6.18-194.el5.ia64",
"5Client:kernel-xen-0:2.6.18-194.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-194.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-194.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-194.el5.x86_64",
"5Server:kernel-0:2.6.18-194.el5.i686",
"5Server:kernel-0:2.6.18-194.el5.ia64",
"5Server:kernel-0:2.6.18-194.el5.ppc64",
"5Server:kernel-0:2.6.18-194.el5.s390x",
"5Server:kernel-0:2.6.18-194.el5.src",
"5Server:kernel-0:2.6.18-194.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-194.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-194.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-194.el5.i686",
"5Server:kernel-debug-0:2.6.18-194.el5.i686",
"5Server:kernel-debug-0:2.6.18-194.el5.ia64",
"5Server:kernel-debug-0:2.6.18-194.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-194.el5.s390x",
"5Server:kernel-debug-0:2.6.18-194.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-194.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-194.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-194.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-194.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-194.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-194.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-194.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-194.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-194.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-194.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-194.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-194.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-194.el5.i686",
"5Server:kernel-devel-0:2.6.18-194.el5.ia64",
"5Server:kernel-devel-0:2.6.18-194.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-194.el5.s390x",
"5Server:kernel-devel-0:2.6.18-194.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-194.el5.noarch",
"5Server:kernel-headers-0:2.6.18-194.el5.i386",
"5Server:kernel-headers-0:2.6.18-194.el5.ia64",
"5Server:kernel-headers-0:2.6.18-194.el5.ppc",
"5Server:kernel-headers-0:2.6.18-194.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-194.el5.s390x",
"5Server:kernel-headers-0:2.6.18-194.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-194.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-194.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-194.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-194.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-194.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-194.el5.s390x",
"5Server:kernel-xen-0:2.6.18-194.el5.i686",
"5Server:kernel-xen-0:2.6.18-194.el5.ia64",
"5Server:kernel-xen-0:2.6.18-194.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-194.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-194.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-194.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0178"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"products": [
"5Client:kernel-0:2.6.18-194.el5.i686",
"5Client:kernel-0:2.6.18-194.el5.ia64",
"5Client:kernel-0:2.6.18-194.el5.ppc64",
"5Client:kernel-0:2.6.18-194.el5.s390x",
"5Client:kernel-0:2.6.18-194.el5.src",
"5Client:kernel-0:2.6.18-194.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-194.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-194.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-194.el5.i686",
"5Client:kernel-debug-0:2.6.18-194.el5.i686",
"5Client:kernel-debug-0:2.6.18-194.el5.ia64",
"5Client:kernel-debug-0:2.6.18-194.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-194.el5.s390x",
"5Client:kernel-debug-0:2.6.18-194.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-194.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-194.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-194.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-194.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-194.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-194.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-194.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-194.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-194.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-194.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-194.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-194.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-194.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-194.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-194.el5.i686",
"5Client:kernel-devel-0:2.6.18-194.el5.ia64",
"5Client:kernel-devel-0:2.6.18-194.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-194.el5.s390x",
"5Client:kernel-devel-0:2.6.18-194.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-194.el5.noarch",
"5Client:kernel-headers-0:2.6.18-194.el5.i386",
"5Client:kernel-headers-0:2.6.18-194.el5.ia64",
"5Client:kernel-headers-0:2.6.18-194.el5.ppc",
"5Client:kernel-headers-0:2.6.18-194.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-194.el5.s390x",
"5Client:kernel-headers-0:2.6.18-194.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-194.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-194.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-194.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-194.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-194.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-194.el5.s390x",
"5Client:kernel-xen-0:2.6.18-194.el5.i686",
"5Client:kernel-xen-0:2.6.18-194.el5.ia64",
"5Client:kernel-xen-0:2.6.18-194.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-194.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-194.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-194.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-194.el5.x86_64",
"5Server:kernel-0:2.6.18-194.el5.i686",
"5Server:kernel-0:2.6.18-194.el5.ia64",
"5Server:kernel-0:2.6.18-194.el5.ppc64",
"5Server:kernel-0:2.6.18-194.el5.s390x",
"5Server:kernel-0:2.6.18-194.el5.src",
"5Server:kernel-0:2.6.18-194.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-194.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-194.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-194.el5.i686",
"5Server:kernel-debug-0:2.6.18-194.el5.i686",
"5Server:kernel-debug-0:2.6.18-194.el5.ia64",
"5Server:kernel-debug-0:2.6.18-194.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-194.el5.s390x",
"5Server:kernel-debug-0:2.6.18-194.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-194.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-194.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-194.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-194.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-194.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-194.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-194.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-194.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-194.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-194.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-194.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-194.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-194.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-194.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-194.el5.i686",
"5Server:kernel-devel-0:2.6.18-194.el5.ia64",
"5Server:kernel-devel-0:2.6.18-194.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-194.el5.s390x",
"5Server:kernel-devel-0:2.6.18-194.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-194.el5.noarch",
"5Server:kernel-headers-0:2.6.18-194.el5.i386",
"5Server:kernel-headers-0:2.6.18-194.el5.ia64",
"5Server:kernel-headers-0:2.6.18-194.el5.ppc",
"5Server:kernel-headers-0:2.6.18-194.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-194.el5.s390x",
"5Server:kernel-headers-0:2.6.18-194.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-194.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-194.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-194.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-194.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-194.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-194.el5.s390x",
"5Server:kernel-xen-0:2.6.18-194.el5.i686",
"5Server:kernel-xen-0:2.6.18-194.el5.ia64",
"5Server:kernel-xen-0:2.6.18-194.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-194.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-194.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-194.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-194.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: ipv6: skb is unexpectedly freed"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…