Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2008-3276 (GCVE-0-2008-3276)
Vulnerability from cvelistv5 – Published: 2008-08-18 17:15 – Updated: 2024-08-07 09:28- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T09:28:41.968Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "32485",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/32485"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=459226"
},
{
"name": "oval:org.mitre.oval:def:11506",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11506"
},
{
"name": "32190",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/32190"
},
{
"name": "[oss-security] 20080815 CVE-2008-3276 Linux kernel dccp_setsockopt_change() integer overflow",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2008/08/15/3"
},
{
"name": "32393",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/32393"
},
{
"name": "DSA-1636",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2008/dsa-1636"
},
{
"name": "32237",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/32237"
},
{
"name": "30704",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/30704"
},
{
"name": "RHSA-2008:0957",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0957.html"
},
{
"name": "31509",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31509"
},
{
"name": "31881",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31881"
},
{
"name": "SUSE-SA:2008:052",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00008.html"
},
{
"name": "USN-659-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/usn-659-1"
},
{
"name": "ADV-2008-2406",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/2406"
},
{
"name": "RHSA-2008:0857",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0857.html"
},
{
"name": "DSA-1653",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2008/dsa-1653"
},
{
"name": "1020705",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1020705"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.26.y.git%3Ba=commit%3Bh=3e8a0a559c66ee9e7468195691a56fefc3589740"
},
{
"name": "32370",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/32370"
},
{
"name": "31836",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31836"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-08-15T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Integer overflow in the dccp_setsockopt_change function in net/dccp/proto.c in the Datagram Congestion Control Protocol (DCCP) subsystem in the Linux kernel 2.6.17-rc1 through 2.6.26.2 allows remote attackers to cause a denial of service (panic) via a crafted integer value, related to Change L and Change R options without at least one byte in the dccpsf_val field."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-28T12:57:01.000Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "32485",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/32485"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=459226"
},
{
"name": "oval:org.mitre.oval:def:11506",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11506"
},
{
"name": "32190",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/32190"
},
{
"name": "[oss-security] 20080815 CVE-2008-3276 Linux kernel dccp_setsockopt_change() integer overflow",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2008/08/15/3"
},
{
"name": "32393",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/32393"
},
{
"name": "DSA-1636",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2008/dsa-1636"
},
{
"name": "32237",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/32237"
},
{
"name": "30704",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/30704"
},
{
"name": "RHSA-2008:0957",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0957.html"
},
{
"name": "31509",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31509"
},
{
"name": "31881",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31881"
},
{
"name": "SUSE-SA:2008:052",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00008.html"
},
{
"name": "USN-659-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/usn-659-1"
},
{
"name": "ADV-2008-2406",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/2406"
},
{
"name": "RHSA-2008:0857",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0857.html"
},
{
"name": "DSA-1653",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2008/dsa-1653"
},
{
"name": "1020705",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1020705"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.26.y.git%3Ba=commit%3Bh=3e8a0a559c66ee9e7468195691a56fefc3589740"
},
{
"name": "32370",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/32370"
},
{
"name": "31836",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31836"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2008-3276",
"datePublished": "2008-08-18T17:15:00.000Z",
"dateReserved": "2008-07-24T00:00:00.000Z",
"dateUpdated": "2024-08-07T09:28:41.968Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9E86E13B-EC92-47F3-94A9-DB515313011D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DEB3068F-2F64-4BBC-BA3C-FB56A2FBED50\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6555D45B-D3B3-4455-AB1E-E513F9FB6139\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4FA5E262-7825-496F-AA72-0AD6DE6F3C78\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"56C6C01B-4CED-4F37-A415-0603496C27DC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9E62F6FA-6C96-4AEE-8547-8C2FE1FAD998\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FE3ACE7A-A600-4ABB-B988-5D59D626DC0B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2F839622-3DE1-4A16-8BD2-5FA2CBF014D3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DC47887B-5608-47BE-85EE-563864461915\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AF39E62B-EAB4-44B0-A421-2A71B7DD8341\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"809264F1-763D-4A8F-B206-222332DD8732\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A66ED53E-3139-4972-B027-D614BFFB8628\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"85A3AB7A-1959-4A57-B83D-B2753C43649E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B8FB7FA3-727D-4BB9-937C-F4F5DA97FFCA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4A60B265-5508-4EE0-980A-44BB0966FD7A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C06F0037-DE20-4B4A-977F-BFCFAB026517\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D08CBC56-C820-4513-ABEC-1ABB3EFC3A15\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"338BB401-8831-4094-9186-2B3CFA5903D3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1E32E6BA-AFEF-44A8-B230-87DD043BB222\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F69E575B-BD1A-4E50-8D6F-131D5E08058E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"20F6269B-5F6B-4413-B14D-7AE5442E4CCD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"189D1246-F975-4411-A58B-343ED90485FD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1B914F7F-C6BD-4527-B1E9-7FD1E337A18C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"82EC9FCA-D17D-4CB9-B925-E8F8B68F8FCE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"179147E4-5247-451D-9409-545D661BC158\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.19.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6554469E-F6AE-4EB0-880E-CBFD196FEE31\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.19.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2F99CFC1-DCCE-47B9-98EF-84AEDAECE02E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.19.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C20367B0-F722-4442-8B59-ABB0FEDB8CC8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.19.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"86A98A70-51E3-4556-8DC4-DD09CF370D1A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.19.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"469EE3B0-3CC2-4AC2-86A0-2DF34205E707\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.19.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FCFECB2B-6482-45F2-B3BB-EDDEDA0948A0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.19.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8EC547EB-9308-4477-8256-A0E04B42D6DA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C6940324-0383-4510-BA55-770E0A6B80B7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1E3313D5-52E8-49B3-B145-170D9A26DA43\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3D3A5FD5-4C42-4B00-8473-D5650FAED9C4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"480F035A-A59D-4113-A246-DF108BB2F591\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"30D39E29-B2A0-4075-84AF-994C27AB0A68\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"19879317-B067-45DA-B497-21EBDDDC2521\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D220C745-28AD-4D04-B2D2-A090D229206E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8BC5B3A6-6CD5-448D-B910-3BAD15FDC3A2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E4AF8895-7BF8-458E-B2BB-68699AABC023\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CA768A9D-6C63-405E-9D14-5D68F8E93A91\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FF495E58-DA6C-402D-B381-4929CB8A502B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AA794BE8-1A22-4BF8-AB79-53E7BCE60D9C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A591301C-C30F-44AC-90F0-709A18AA96E0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F7D2606B-00A6-4FA3-A00D-B1E8A80B947C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"610A93BB-70E3-4BF1-83E8-8A7388477F44\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"821BD11F-3C6A-4424-BC9B-DFD786248B07\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6F55A024-9F8E-44F8-A0D8-696BC232524A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"84595143-3B04-4CE8-81C0-28EEEC58CD0E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"32EE2B49-DDEB-4B49-A5F0-CAA161095A5F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C3ABFA33-8FA1-488E-A9BD-1593F495F595\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"62F6DE3A-E6CC-4D7E-BD08-E43DC4182200\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A9A29C44-EBE5-42B0-AFAD-C5A8F6EEF2F8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"50B422D1-6C6E-4359-A169-3EED78A1CF40\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.21.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6AD2E9DC-2876-4515-BCE6-DDD0CC6A5708\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.21.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A2F19064-CFBF-4B3C-A0A1-CE62265CD592\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.21.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AD3F0CEC-B8FA-47E3-BA3E-182F43D3DA86\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.21.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AB759752-DC19-4750-838B-056063EFDC5F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.21.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"96A43C95-8569-40BE-9E5B-F9B3D0B9D188\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.21.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ABD70B2B-9827-4DBB-B82D-0B70C2D4AB1F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.21.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"99662904-E5E3-4E81-B199-39707EAEB652\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"615BDD1D-36AA-4976-909B-F0F66BF1090C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EE8A26D6-1BDA-45F0-8F7C-F95986050E32\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"61A3EDF2-09D7-4116-AE46-D86E4B9602AC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F320FA9F-C13D-4AA3-B838-A0E5D63E6A29\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B179CF1D-084D-4B21-956F-E55AC6BDE026\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6F1B4877-286A-44B5-9C5C-0403F75B2BAA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"432CA976-6EFA-4D34-B5EA-CD772D067F93\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6E476195-657E-416E-BC16-44A18B06A133\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"12A55028-B8F9-4AD2-AE57-A80D561F3C79\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0C4E641C-67D4-4599-8EFB-0B2F8D81D68C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"70460F6C-D6C0-4C1A-B13E-368705EAF223\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3F26BA18-08AD-45FE-9F83-25CCB2E27270\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6EBFF148-3EDA-4216-910B-8930D8C443C2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"648C63F7-EA1D-4F2E-B8AF-1F380C83E542\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1697B855-4834-4633-A5C8-C1F7F13ACE0D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1FBAE75F-9145-4B9A-A6D8-E488C5326145\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DFF566DA-0F04-48DA-AA40-565979C55328\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5990C6C2-2F66-4C4D-8224-74163865F410\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3A45A9B9-4B19-4A5B-BC95-BCBC4EF00F12\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C23AD176-3B99-4593-BCBD-13C1E579A13E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C6A3A30-FEA4-40B6-98A9-1840BB4E8CBE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5140380C-71BD-464F-AE53-1814C2653056\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B18EC0A7-8616-4039-B98B-E1216E035B05\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"22FB141B-FA2A-435D-8937-83FC0669CB20\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C59131C8-F66A-4380-9F6E-3FC14C7C8562\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A5421616-4BF5-4269-8996-C3D2BA6AE2A1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"23FC6CE2-8717-4558-A309-A441D322F00E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"311BE336-7BB2-47C0-AED5-3DEA706C206F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CE87D1BC-A72D-42D2-A93C-67A5823BEB14\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5AAC2E9D-0E82-4866-9046-ADD448418198\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"760FB32D-9795-4B29-B79A-A32B5E70F7EE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0DFF67E9-B0C2-48D5-BB3A-CF21D10010FF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5881A78C-D162-4DE5-8353-2BB1EC1F428B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B13D81D2-1A89-4E61-A90C-5E8BB880310B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"67F2047A-5F17-4B59-9075-41A5DC5C1CD1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"80F9887E-2466-4C73-A8E1-2117492F9EC9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8FDE5B27-2EF0-464E-8F14-5E809D84D389\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"815B2EE8-136F-44E4-997D-5F93A54775DD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.24:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"13673DF5-09B1-40C8-AC54-A447DE8AB01E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.24.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"52152F5A-1833-4490-A373-9C547B90B0F8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.24.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B64A095E-5E97-445E-B435-F09983CC0E7A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.24.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B8035F93-9DEE-4B92-ABAA-4ABE0B71BF41\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.24.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6EE92406-DBF3-463E-8A51-F9679E851FDB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.24.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3C60D19B-ED9B-443C-9D49-002ABD381119\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.24.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"264C61EE-64F6-43AD-B54F-7D683C29E64F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.24.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0149408A-30F6-4EDF-8B3B-CBAB884CE758\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"71295664-89EC-4BB3-9F86-B1DDA20FAC5A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"37BE853A-BA6F-4A70-B166-E34441F0B7DE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"85064FDF-4B62-43BF-B36C-F659D739BC22\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CEADC505-FF44-4D45-8EA6-B23A1C4564D1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0CE3C807-5C9B-4B71-868B-DF17ECB1514F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A6CADAA2-91D2-40C4-90F3-D7F40A3D4CB0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"45B6847C-873B-4BE1-852D-239115E59BA4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FF41209E-D27F-4642-A405-90E822A41897\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"97F59FD9-46E5-4F63-80A0-091AD44D1867\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"428844A5-E020-4AE9-8012-9AEDFCB7C32E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"94C9D70D-A552-48D6-9497-EE07EB5649D1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AF6169FF-9FF9-4A81-BAEB-6D5132F64F61\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E6DC79CF-A504-4232-9F66-B5DCD0213DA0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"192B4273-0935-4232-BBFD-A850855CAC5F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"60E9FDA8-7EC3-4B9B-B508-27F948D60DDB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E4E4A6E5-0C2C-42FD-B982-684CCB0DDFBB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.26:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E45F4429-5A9C-4E8B-96EE-CCF19776CABF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.26.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3A74970C-5EEA-47A7-A62D-AF98F4D1228F\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Integer overflow in the dccp_setsockopt_change function in net/dccp/proto.c in the Datagram Congestion Control Protocol (DCCP) subsystem in the Linux kernel 2.6.17-rc1 through 2.6.26.2 allows remote attackers to cause a denial of service (panic) via a crafted integer value, related to Change L and Change R options without at least one byte in the dccpsf_val field.\"}, {\"lang\": \"es\", \"value\": \"Desbordamiento de entero en la funci\\u00f3n dccp_setsockopt_change de net/dccp/proto.c en el subsistema Datagram Congestion Control Protocol (DCCP (Protocolo de Control de Congesti\\u00f3n de Datagramas)) del kernel de Linux de 2.6.17-rc1 a 2.6.26.2 permite a atacantes remotos provocar una denegaci\\u00f3n de servicio (p\\u00e1nico) mediante un valor de entero manipulado, relacionado con opciones Change L y Change R que no tienen al menos un byte en el campo dccpsf_val.\"}]",
"id": "CVE-2008-3276",
"lastModified": "2024-11-21T00:48:52.043",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:N/I:N/A:C\", \"baseScore\": 7.1, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 8.6, \"impactScore\": 6.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2008-08-18T17:41:00.000",
"references": "[{\"url\": \"http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.26.y.git%3Ba=commit%3Bh=3e8a0a559c66ee9e7468195691a56fefc3589740\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00008.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/31509\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/31836\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/31881\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/32190\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/32237\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/32370\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/32393\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/32485\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.debian.org/security/2008/dsa-1636\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.debian.org/security/2008/dsa-1653\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2008/08/15/3\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2008-0857.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2008-0957.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.securityfocus.com/bid/30704\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.securitytracker.com/id?1020705\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.ubuntu.com/usn/usn-659-1\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.vupen.com/english/advisories/2008/2406\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=459226\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11506\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.26.y.git%3Ba=commit%3Bh=3e8a0a559c66ee9e7468195691a56fefc3589740\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00008.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/31509\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/31836\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/31881\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/32190\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/32237\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/32370\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/32393\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/32485\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.debian.org/security/2008/dsa-1636\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.debian.org/security/2008/dsa-1653\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2008/08/15/3\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2008-0857.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2008-0957.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/30704\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securitytracker.com/id?1020705\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.ubuntu.com/usn/usn-659-1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2008/2406\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=459226\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11506\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-189\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2008-3276\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2008-08-18T17:41:00.000\",\"lastModified\":\"2025-04-09T00:30:58.490\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Integer overflow in the dccp_setsockopt_change function in net/dccp/proto.c in the Datagram Congestion Control Protocol (DCCP) subsystem in the Linux kernel 2.6.17-rc1 through 2.6.26.2 allows remote attackers to cause a denial of service (panic) via a crafted integer value, related to Change L and Change R options without at least one byte in the dccpsf_val field.\"},{\"lang\":\"es\",\"value\":\"Desbordamiento de entero en la funci\u00f3n dccp_setsockopt_change de net/dccp/proto.c en el subsistema Datagram Congestion Control Protocol (DCCP (Protocolo de Control de Congesti\u00f3n de Datagramas)) del kernel de Linux de 2.6.17-rc1 a 2.6.26.2 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (p\u00e1nico) mediante un valor de entero manipulado, relacionado con opciones Change L y Change R que no tienen al menos un byte en el campo dccpsf_val.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:N/A:C\",\"baseScore\":7.1,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.6,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-189\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E86E13B-EC92-47F3-94A9-DB515313011D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEB3068F-2F64-4BBC-BA3C-FB56A2FBED50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6555D45B-D3B3-4455-AB1E-E513F9FB6139\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FA5E262-7825-496F-AA72-0AD6DE6F3C78\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56C6C01B-4CED-4F37-A415-0603496C27DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E62F6FA-6C96-4AEE-8547-8C2FE1FAD998\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE3ACE7A-A600-4ABB-B988-5D59D626DC0B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F839622-3DE1-4A16-8BD2-5FA2CBF014D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC47887B-5608-47BE-85EE-563864461915\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF39E62B-EAB4-44B0-A421-2A71B7DD8341\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"809264F1-763D-4A8F-B206-222332DD8732\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A66ED53E-3139-4972-B027-D614BFFB8628\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85A3AB7A-1959-4A57-B83D-B2753C43649E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8FB7FA3-727D-4BB9-937C-F4F5DA97FFCA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A60B265-5508-4EE0-980A-44BB0966FD7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C06F0037-DE20-4B4A-977F-BFCFAB026517\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D08CBC56-C820-4513-ABEC-1ABB3EFC3A15\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"338BB401-8831-4094-9186-2B3CFA5903D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E32E6BA-AFEF-44A8-B230-87DD043BB222\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F69E575B-BD1A-4E50-8D6F-131D5E08058E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20F6269B-5F6B-4413-B14D-7AE5442E4CCD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"189D1246-F975-4411-A58B-343ED90485FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B914F7F-C6BD-4527-B1E9-7FD1E337A18C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82EC9FCA-D17D-4CB9-B925-E8F8B68F8FCE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"179147E4-5247-451D-9409-545D661BC158\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6554469E-F6AE-4EB0-880E-CBFD196FEE31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F99CFC1-DCCE-47B9-98EF-84AEDAECE02E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C20367B0-F722-4442-8B59-ABB0FEDB8CC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86A98A70-51E3-4556-8DC4-DD09CF370D1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"469EE3B0-3CC2-4AC2-86A0-2DF34205E707\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCFECB2B-6482-45F2-B3BB-EDDEDA0948A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EC547EB-9308-4477-8256-A0E04B42D6DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6940324-0383-4510-BA55-770E0A6B80B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E3313D5-52E8-49B3-B145-170D9A26DA43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D3A5FD5-4C42-4B00-8473-D5650FAED9C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"480F035A-A59D-4113-A246-DF108BB2F591\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30D39E29-B2A0-4075-84AF-994C27AB0A68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19879317-B067-45DA-B497-21EBDDDC2521\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D220C745-28AD-4D04-B2D2-A090D229206E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BC5B3A6-6CD5-448D-B910-3BAD15FDC3A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4AF8895-7BF8-458E-B2BB-68699AABC023\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA768A9D-6C63-405E-9D14-5D68F8E93A91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF495E58-DA6C-402D-B381-4929CB8A502B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA794BE8-1A22-4BF8-AB79-53E7BCE60D9C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A591301C-C30F-44AC-90F0-709A18AA96E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7D2606B-00A6-4FA3-A00D-B1E8A80B947C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"610A93BB-70E3-4BF1-83E8-8A7388477F44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"821BD11F-3C6A-4424-BC9B-DFD786248B07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F55A024-9F8E-44F8-A0D8-696BC232524A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84595143-3B04-4CE8-81C0-28EEEC58CD0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32EE2B49-DDEB-4B49-A5F0-CAA161095A5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3ABFA33-8FA1-488E-A9BD-1593F495F595\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62F6DE3A-E6CC-4D7E-BD08-E43DC4182200\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9A29C44-EBE5-42B0-AFAD-C5A8F6EEF2F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50B422D1-6C6E-4359-A169-3EED78A1CF40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AD2E9DC-2876-4515-BCE6-DDD0CC6A5708\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2F19064-CFBF-4B3C-A0A1-CE62265CD592\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD3F0CEC-B8FA-47E3-BA3E-182F43D3DA86\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB759752-DC19-4750-838B-056063EFDC5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96A43C95-8569-40BE-9E5B-F9B3D0B9D188\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABD70B2B-9827-4DBB-B82D-0B70C2D4AB1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99662904-E5E3-4E81-B199-39707EAEB652\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"615BDD1D-36AA-4976-909B-F0F66BF1090C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE8A26D6-1BDA-45F0-8F7C-F95986050E32\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61A3EDF2-09D7-4116-AE46-D86E4B9602AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F320FA9F-C13D-4AA3-B838-A0E5D63E6A29\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B179CF1D-084D-4B21-956F-E55AC6BDE026\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F1B4877-286A-44B5-9C5C-0403F75B2BAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"432CA976-6EFA-4D34-B5EA-CD772D067F93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E476195-657E-416E-BC16-44A18B06A133\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12A55028-B8F9-4AD2-AE57-A80D561F3C79\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C4E641C-67D4-4599-8EFB-0B2F8D81D68C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70460F6C-D6C0-4C1A-B13E-368705EAF223\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F26BA18-08AD-45FE-9F83-25CCB2E27270\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EBFF148-3EDA-4216-910B-8930D8C443C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"648C63F7-EA1D-4F2E-B8AF-1F380C83E542\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1697B855-4834-4633-A5C8-C1F7F13ACE0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FBAE75F-9145-4B9A-A6D8-E488C5326145\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFF566DA-0F04-48DA-AA40-565979C55328\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5990C6C2-2F66-4C4D-8224-74163865F410\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A45A9B9-4B19-4A5B-BC95-BCBC4EF00F12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C23AD176-3B99-4593-BCBD-13C1E579A13E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C6A3A30-FEA4-40B6-98A9-1840BB4E8CBE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5140380C-71BD-464F-AE53-1814C2653056\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B18EC0A7-8616-4039-B98B-E1216E035B05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22FB141B-FA2A-435D-8937-83FC0669CB20\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C59131C8-F66A-4380-9F6E-3FC14C7C8562\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5421616-4BF5-4269-8996-C3D2BA6AE2A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23FC6CE2-8717-4558-A309-A441D322F00E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"311BE336-7BB2-47C0-AED5-3DEA706C206F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE87D1BC-A72D-42D2-A93C-67A5823BEB14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AAC2E9D-0E82-4866-9046-ADD448418198\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"760FB32D-9795-4B29-B79A-A32B5E70F7EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DFF67E9-B0C2-48D5-BB3A-CF21D10010FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5881A78C-D162-4DE5-8353-2BB1EC1F428B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B13D81D2-1A89-4E61-A90C-5E8BB880310B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67F2047A-5F17-4B59-9075-41A5DC5C1CD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80F9887E-2466-4C73-A8E1-2117492F9EC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FDE5B27-2EF0-464E-8F14-5E809D84D389\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"815B2EE8-136F-44E4-997D-5F93A54775DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13673DF5-09B1-40C8-AC54-A447DE8AB01E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52152F5A-1833-4490-A373-9C547B90B0F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B64A095E-5E97-445E-B435-F09983CC0E7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8035F93-9DEE-4B92-ABAA-4ABE0B71BF41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EE92406-DBF3-463E-8A51-F9679E851FDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C60D19B-ED9B-443C-9D49-002ABD381119\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"264C61EE-64F6-43AD-B54F-7D683C29E64F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0149408A-30F6-4EDF-8B3B-CBAB884CE758\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71295664-89EC-4BB3-9F86-B1DDA20FAC5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37BE853A-BA6F-4A70-B166-E34441F0B7DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85064FDF-4B62-43BF-B36C-F659D739BC22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEADC505-FF44-4D45-8EA6-B23A1C4564D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CE3C807-5C9B-4B71-868B-DF17ECB1514F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6CADAA2-91D2-40C4-90F3-D7F40A3D4CB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45B6847C-873B-4BE1-852D-239115E59BA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF41209E-D27F-4642-A405-90E822A41897\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97F59FD9-46E5-4F63-80A0-091AD44D1867\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"428844A5-E020-4AE9-8012-9AEDFCB7C32E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94C9D70D-A552-48D6-9497-EE07EB5649D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF6169FF-9FF9-4A81-BAEB-6D5132F64F61\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6DC79CF-A504-4232-9F66-B5DCD0213DA0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"192B4273-0935-4232-BBFD-A850855CAC5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60E9FDA8-7EC3-4B9B-B508-27F948D60DDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4E4A6E5-0C2C-42FD-B982-684CCB0DDFBB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E45F4429-5A9C-4E8B-96EE-CCF19776CABF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.26.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A74970C-5EEA-47A7-A62D-AF98F4D1228F\"}]}]}],\"references\":[{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.26.y.git%3Ba=commit%3Bh=3e8a0a559c66ee9e7468195691a56fefc3589740\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00008.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/31509\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/31836\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/31881\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/32190\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/32237\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/32370\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/32393\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/32485\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2008/dsa-1636\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2008/dsa-1653\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2008/08/15/3\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0857.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0957.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/30704\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securitytracker.com/id?1020705\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.ubuntu.com/usn/usn-659-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/2406\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=459226\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11506\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.26.y.git%3Ba=commit%3Bh=3e8a0a559c66ee9e7468195691a56fefc3589740\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00008.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/31509\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/31836\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/31881\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/32190\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/32237\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/32370\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/32393\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/32485\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2008/dsa-1636\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2008/dsa-1653\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2008/08/15/3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0857.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0957.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/30704\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id?1020705\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/usn-659-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/2406\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=459226\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11506\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
GSD-2008-3276
Vulnerability from gsd - Updated: 2023-12-13 01:23{
"GSD": {
"alias": "CVE-2008-3276",
"description": "Integer overflow in the dccp_setsockopt_change function in net/dccp/proto.c in the Datagram Congestion Control Protocol (DCCP) subsystem in the Linux kernel 2.6.17-rc1 through 2.6.26.2 allows remote attackers to cause a denial of service (panic) via a crafted integer value, related to Change L and Change R options without at least one byte in the dccpsf_val field.",
"id": "GSD-2008-3276",
"references": [
"https://www.suse.com/security/cve/CVE-2008-3276.html",
"https://www.debian.org/security/2008/dsa-1653",
"https://www.debian.org/security/2008/dsa-1636",
"https://access.redhat.com/errata/RHSA-2008:0957",
"https://access.redhat.com/errata/RHSA-2008:0857",
"https://linux.oracle.com/cve/CVE-2008-3276.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2008-3276"
],
"details": "Integer overflow in the dccp_setsockopt_change function in net/dccp/proto.c in the Datagram Congestion Control Protocol (DCCP) subsystem in the Linux kernel 2.6.17-rc1 through 2.6.26.2 allows remote attackers to cause a denial of service (panic) via a crafted integer value, related to Change L and Change R options without at least one byte in the dccpsf_val field.",
"id": "GSD-2008-3276",
"modified": "2023-12-13T01:23:05.460039Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2008-3276",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Integer overflow in the dccp_setsockopt_change function in net/dccp/proto.c in the Datagram Congestion Control Protocol (DCCP) subsystem in the Linux kernel 2.6.17-rc1 through 2.6.26.2 allows remote attackers to cause a denial of service (panic) via a crafted integer value, related to Change L and Change R options without at least one byte in the dccpsf_val field."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00008.html",
"refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00008.html"
},
{
"name": "http://secunia.com/advisories/31836",
"refsource": "MISC",
"url": "http://secunia.com/advisories/31836"
},
{
"name": "http://secunia.com/advisories/31881",
"refsource": "MISC",
"url": "http://secunia.com/advisories/31881"
},
{
"name": "http://secunia.com/advisories/32190",
"refsource": "MISC",
"url": "http://secunia.com/advisories/32190"
},
{
"name": "http://secunia.com/advisories/32370",
"refsource": "MISC",
"url": "http://secunia.com/advisories/32370"
},
{
"name": "http://www.debian.org/security/2008/dsa-1636",
"refsource": "MISC",
"url": "http://www.debian.org/security/2008/dsa-1636"
},
{
"name": "http://www.redhat.com/support/errata/RHSA-2008-0857.html",
"refsource": "MISC",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0857.html"
},
{
"name": "http://secunia.com/advisories/32237",
"refsource": "MISC",
"url": "http://secunia.com/advisories/32237"
},
{
"name": "http://secunia.com/advisories/32485",
"refsource": "MISC",
"url": "http://secunia.com/advisories/32485"
},
{
"name": "http://www.debian.org/security/2008/dsa-1653",
"refsource": "MISC",
"url": "http://www.debian.org/security/2008/dsa-1653"
},
{
"name": "http://www.redhat.com/support/errata/RHSA-2008-0957.html",
"refsource": "MISC",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0957.html"
},
{
"name": "http://secunia.com/advisories/32393",
"refsource": "MISC",
"url": "http://secunia.com/advisories/32393"
},
{
"name": "http://www.ubuntu.com/usn/usn-659-1",
"refsource": "MISC",
"url": "http://www.ubuntu.com/usn/usn-659-1"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.26.y.git%3Ba=commit%3Bh=3e8a0a559c66ee9e7468195691a56fefc3589740",
"refsource": "MISC",
"url": "http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.26.y.git%3Ba=commit%3Bh=3e8a0a559c66ee9e7468195691a56fefc3589740"
},
{
"name": "http://secunia.com/advisories/31509",
"refsource": "MISC",
"url": "http://secunia.com/advisories/31509"
},
{
"name": "http://www.openwall.com/lists/oss-security/2008/08/15/3",
"refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2008/08/15/3"
},
{
"name": "http://www.securityfocus.com/bid/30704",
"refsource": "MISC",
"url": "http://www.securityfocus.com/bid/30704"
},
{
"name": "http://www.securitytracker.com/id?1020705",
"refsource": "MISC",
"url": "http://www.securitytracker.com/id?1020705"
},
{
"name": "http://www.vupen.com/english/advisories/2008/2406",
"refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2008/2406"
},
{
"name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11506",
"refsource": "MISC",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11506"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=459226",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=459226"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.26:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.26.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2008-3276"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Integer overflow in the dccp_setsockopt_change function in net/dccp/proto.c in the Datagram Congestion Control Protocol (DCCP) subsystem in the Linux kernel 2.6.17-rc1 through 2.6.26.2 allows remote attackers to cause a denial of service (panic) via a crafted integer value, related to Change L and Change R options without at least one byte in the dccpsf_val field."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-189"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20080815 CVE-2008-3276 Linux kernel dccp_setsockopt_change() integer overflow",
"refsource": "MLIST",
"tags": [],
"url": "http://www.openwall.com/lists/oss-security/2008/08/15/3"
},
{
"name": "30704",
"refsource": "BID",
"tags": [],
"url": "http://www.securityfocus.com/bid/30704"
},
{
"name": "31509",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/31509"
},
{
"name": "1020705",
"refsource": "SECTRACK",
"tags": [],
"url": "http://www.securitytracker.com/id?1020705"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=459226",
"refsource": "CONFIRM",
"tags": [],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=459226"
},
{
"name": "31881",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/31881"
},
{
"name": "DSA-1636",
"refsource": "DEBIAN",
"tags": [],
"url": "http://www.debian.org/security/2008/dsa-1636"
},
{
"name": "RHSA-2008:0857",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0857.html"
},
{
"name": "32190",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/32190"
},
{
"name": "31836",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/31836"
},
{
"name": "USN-659-1",
"refsource": "UBUNTU",
"tags": [],
"url": "http://www.ubuntu.com/usn/usn-659-1"
},
{
"name": "32393",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/32393"
},
{
"name": "32485",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/32485"
},
{
"name": "RHSA-2008:0957",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0957.html"
},
{
"name": "DSA-1653",
"refsource": "DEBIAN",
"tags": [],
"url": "http://www.debian.org/security/2008/dsa-1653"
},
{
"name": "32237",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/32237"
},
{
"name": "ADV-2008-2406",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2008/2406"
},
{
"name": "SUSE-SA:2008:052",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00008.html"
},
{
"name": "32370",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/32370"
},
{
"name": "oval:org.mitre.oval:def:11506",
"refsource": "OVAL",
"tags": [],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11506"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.26.y.git%3Ba=commit%3Bh=3e8a0a559c66ee9e7468195691a56fefc3589740",
"refsource": "MISC",
"tags": [],
"url": "http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.26.y.git%3Ba=commit%3Bh=3e8a0a559c66ee9e7468195691a56fefc3589740"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2023-02-13T02:19Z",
"publishedDate": "2008-08-18T17:41Z"
}
}
}
RHSA-2008:0857
Vulnerability from csaf_redhat - Published: 2008-10-07 19:16 - Updated: 2025-11-21 17:33The snd_seq_oss_synth_make_info function in sound/core/seq/oss/seq_oss_synth.c in the sound subsystem in the Linux kernel before 2.6.27-rc2 does not verify that the device number is within the range defined by max_synthdev before returning certain data to the caller, which allows local users to obtain sensitive information.
The (1) real_lookup and (2) __lookup_hash functions in fs/namei.c in the vfs implementation in the Linux kernel before 2.6.25.15 do not prevent creation of a child dentry for a deleted (aka S_DEAD) directory, which allows local users to cause a denial of service ("overflow" of the UBIFS orphan area) via a series of attempted file creations within deleted directories.
Integer overflow in the dccp_setsockopt_change function in net/dccp/proto.c in the Datagram Congestion Control Protocol (DCCP) subsystem in the Linux kernel 2.6.17-rc1 through 2.6.26.2 allows remote attackers to cause a denial of service (panic) via a crafted integer value, related to Change L and Change R options without at least one byte in the dccpsf_val field.
CWE-190 - Integer Overflow or WraparoundInteger overflow in the sctp_setsockopt_auth_key function in net/sctp/socket.c in the Stream Control Transmission Protocol (sctp) implementation in the Linux kernel 2.6.24-rc1 through 2.6.26.3 allows remote attackers to cause a denial of service (panic) or possibly have unspecified other impact via a crafted sca_keylength field associated with the SCTP_AUTH_KEY option.
CWE-190 - Integer Overflow or WraparoundThe shmem_delete_inode function in mm/shmem.c in the tmpfs implementation in the Linux kernel before 2.6.26.1 allows local users to cause a denial of service (system crash) via a certain sequence of file create, remove, and overwrite operations, as demonstrated by the insserv program, related to allocation of "useless pages" and improper maintenance of the i_blocks count.
Off-by-one error in the iov_iter_advance function in mm/filemap.c in the Linux kernel before 2.6.27-rc2 allows local users to cause a denial of service (system crash) via a certain sequence of file I/O operations with readv and writev, as demonstrated by testcases/kernel/fs/ftest/ftest03 from the Linux Test Project.
CWE-193 - Off-by-one Errornet/sctp/socket.c in the Stream Control Transmission Protocol (sctp) implementation in the Linux kernel before 2.6.26.4 does not verify that the SCTP-AUTH extension is enabled before proceeding with SCTP-AUTH API functions, which allows attackers to cause a denial of service (NULL pointer dereference and panic) via vectors that result in calls to (1) sctp_setsockopt_auth_chunk, (2) sctp_setsockopt_hmac_ident, (3) sctp_setsockopt_auth_key, (4) sctp_setsockopt_active_key, (5) sctp_setsockopt_del_key, (6) sctp_getsockopt_maxburst, (7) sctp_getsockopt_active_key, (8) sctp_getsockopt_peer_auth_chunks, or (9) sctp_getsockopt_local_auth_chunks.
Buffer overflow in nfsd in the Linux kernel before 2.6.26.4, when NFSv4 is enabled, allows remote attackers to have an unknown impact via vectors related to decoding an NFSv4 acl.
The sctp_getsockopt_hmac_ident function in net/sctp/socket.c in the Stream Control Transmission Protocol (sctp) implementation in the Linux kernel before 2.6.26.4, when the SCTP-AUTH extension is enabled, relies on an untrusted length value to limit copying of data from kernel memory, which allows local users to obtain sensitive information via a crafted SCTP_HMAC_IDENT IOCTL request involving the sctp_getsockopt function.
The sctp_auth_ep_set_hmacs function in net/sctp/auth.c in the Stream Control Transmission Protocol (sctp) implementation in the Linux kernel before 2.6.26.4, when the SCTP-AUTH extension is enabled, does not verify that the identifier index is within the bounds established by SCTP_AUTH_HMAC_ID_MAX, which allows local users to obtain sensitive information via a crafted SCTP_HMAC_IDENT IOCTL request involving the sctp_getsockopt function, a different vulnerability than CVE-2008-4113.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated kernel packages that fix several security issues and several bugs\nare now available for Red Hat Enterprise MRG 1.0.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nA possible integer overflow was found in the Linux kernel Stream Control\nTransmission Protocol (SCTP) implementation. This could allow an attacker\nto cause a denial of service. (CVE-2008-3526, Important)\n\nA deficiency was found in the Linux kernel Stream Control Transmission\nProtocol (SCTP) Authentication Extension implementation. All the SCTP-AUTH\nsocket options could cause a kernel panic if the API was used when the\nextension is disabled. (CVE-2008-3792, Important)\n\nMissing boundary checks were reported in the Linux kernel SCTP\nimplementation. This could, potentially, cause information disclosure via a\nspecially crafted SCTP_HMAC_IDENT IOCTL request. (CVE-2008-4113,\nCVE-2008-4445, Important)\n\nTobias Klein reported a missing check in the Linux kernel\u0027s Open Sound\nSystem (OSS) implementation. This deficiency could lead to a possible\ninformation leak. (CVE-2008-3272, Moderate)\n\nA deficiency was found in the Linux kernel virtual filesystem (VFS)\nimplementation. This could allow a local unprivileged user to make a series\nof file creations within deleted directories, possibly causing a denial of\nservice. (CVE-2008-3275, Moderate)\n\nA flaw was found in the Linux kernel Network File System daemon (nfsd) when\nNFSv4 was enabled. Remote attackers could use this to cause a denial of\nservice via a buffer overflow. (CVE-2008-3915, Moderate)\n\nA possible integer overflow was discovered in the Linux kernel Datagram\nCongestion Control Protocol (DCCP) implementation. This could allow a\nremote attacker to cause a denial of service on a victim\u0027s machine.\n(CVE-2008-3276, Low)\n\nA deficiency was found in the Linux kernel tmpfs implementation. This could\nallow a local unprivileged user to make a certain sequence of file\noperations, possibly causing a denial of service. (CVE-2008-3534, Low)\n\nAn off-by-one error was found in the iov_iter_advance function. This could\nallow a local unprivileged user to cause a denial of service as\ndemonstrated by a testcase from the Linux Test Project. (CVE-2008-3535,\nLow)\n\nThese updated packages also fix the following bugs:\n\n* fixed a warning in the openib code.\n\n* increased MAX_STACK_TRACE_ENTRIES on the debug kernel variant.\n\n* enqueue deprioritized RT tasks to head of prio array.\n\n* use timer_pending() to test ipv6 FIB timers.\n\n* added a lower-bound check for the length field in PPPOE headers.\n\n* pppoe: unshare skb to avoid possible data loss.\n\n* using growisofs could cause oops due to the lack of proper sanity checks.\n\n* random seed improvement.\n\n* enabled the \"Panic on Oops\" feature.\n\n* fixed a portability issue in parse_pmtmr() due to variable type.\n\n* fixed sanity check in cifs/asn1.c.\n\n* fixed a bug introduced by a previous fix, related to the inode code.\n\n* added better sanity checks to dlm code.\n\n* dynamic ftrace enhancements. The daemon is no longer used.\n\n* fixed a format string bug in cpufreq.\n\n* avoid a potential kernel stack overflow in binfmt_misc.c\n\n* fixed the long boot-up time when CONFIG_PROVE_LOCKING is enabled.\n\n* use a better random seed for NAT port randomization.\n\n* a compat_semaphore was being handled as a regular semaphore due to\ncasting (qla2xxx driver).\n\nAll users of Red Hat Enterprise MRG should upgrade to these new packages,\nwhich address these vulnerabilities and fix these bugs.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2008:0857",
"url": "https://access.redhat.com/errata/RHSA-2008:0857"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "447942",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=447942"
},
{
"category": "external",
"summary": "448574",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=448574"
},
{
"category": "external",
"summary": "454270",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=454270"
},
{
"category": "external",
"summary": "457012",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=457012"
},
{
"category": "external",
"summary": "457014",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=457014"
},
{
"category": "external",
"summary": "457019",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=457019"
},
{
"category": "external",
"summary": "457027",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=457027"
},
{
"category": "external",
"summary": "457507",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=457507"
},
{
"category": "external",
"summary": "457703",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=457703"
},
{
"category": "external",
"summary": "457858",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=457858"
},
{
"category": "external",
"summary": "457995",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=457995"
},
{
"category": "external",
"summary": "458016",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458016"
},
{
"category": "external",
"summary": "458104",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458104"
},
{
"category": "external",
"summary": "458340",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458340"
},
{
"category": "external",
"summary": "458350",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458350"
},
{
"category": "external",
"summary": "458487",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458487"
},
{
"category": "external",
"summary": "458755",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458755"
},
{
"category": "external",
"summary": "458756",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458756"
},
{
"category": "external",
"summary": "458758",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458758"
},
{
"category": "external",
"summary": "459141",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=459141"
},
{
"category": "external",
"summary": "459226",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=459226"
},
{
"category": "external",
"summary": "459459",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=459459"
},
{
"category": "external",
"summary": "459462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=459462"
},
{
"category": "external",
"summary": "459478",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=459478"
},
{
"category": "external",
"summary": "459942",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=459942"
},
{
"category": "external",
"summary": "459955",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=459955"
},
{
"category": "external",
"summary": "460093",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=460093"
},
{
"category": "external",
"summary": "460455",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=460455"
},
{
"category": "external",
"summary": "461101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=461101"
},
{
"category": "external",
"summary": "462599",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=462599"
},
{
"category": "external",
"summary": "464514",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=464514"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0857.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-11-21T17:33:47+00:00",
"generator": {
"date": "2025-11-21T17:33:47+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2008:0857",
"initial_release_date": "2008-10-07T19:16:00+00:00",
"revision_history": [
{
"date": "2008-10-07T19:16:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2008-10-07T15:18:59+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:33:47+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "MRG Realtime for RHEL 5 Server",
"product": {
"name": "MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_mrg:1::el5"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise MRG for RHEL-5"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-devel-0:2.6.24.7-81.el5rt.i686",
"product": {
"name": "kernel-rt-devel-0:2.6.24.7-81.el5rt.i686",
"product_id": "kernel-rt-devel-0:2.6.24.7-81.el5rt.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@2.6.24.7-81.el5rt?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.i686",
"product": {
"name": "kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.i686",
"product_id": "kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@2.6.24.7-81.el5rt?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:2.6.24.7-81.el5rt.i686",
"product": {
"name": "kernel-rt-debug-0:2.6.24.7-81.el5rt.i686",
"product_id": "kernel-rt-debug-0:2.6.24.7-81.el5rt.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@2.6.24.7-81.el5rt?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-0:2.6.24.7-81.el5rt.i686",
"product": {
"name": "kernel-rt-0:2.6.24.7-81.el5rt.i686",
"product_id": "kernel-rt-0:2.6.24.7-81.el5rt.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-81.el5rt?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.i686",
"product": {
"name": "kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.i686",
"product_id": "kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-devel@2.6.24.7-81.el5rt?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.i686",
"product": {
"name": "kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.i686",
"product_id": "kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common@2.6.24.7-81.el5rt?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.i686",
"product": {
"name": "kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.i686",
"product_id": "kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@2.6.24.7-81.el5rt?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.i686",
"product": {
"name": "kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.i686",
"product_id": "kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@2.6.24.7-81.el5rt?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.i686",
"product": {
"name": "kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.i686",
"product_id": "kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@2.6.24.7-81.el5rt?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.i686",
"product": {
"name": "kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.i686",
"product_id": "kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@2.6.24.7-81.el5rt?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.i686",
"product": {
"name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.i686",
"product_id": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@2.6.24.7-81.el5rt?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-0:2.6.24.7-81.el5rt.i686",
"product": {
"name": "kernel-rt-trace-0:2.6.24.7-81.el5rt.i686",
"product_id": "kernel-rt-trace-0:2.6.24.7-81.el5rt.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace@2.6.24.7-81.el5rt?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-vanilla-0:2.6.24.7-81.el5rt.i686",
"product": {
"name": "kernel-rt-vanilla-0:2.6.24.7-81.el5rt.i686",
"product_id": "kernel-rt-vanilla-0:2.6.24.7-81.el5rt.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-vanilla@2.6.24.7-81.el5rt?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-devel-0:2.6.24.7-81.el5rt.x86_64",
"product": {
"name": "kernel-rt-devel-0:2.6.24.7-81.el5rt.x86_64",
"product_id": "kernel-rt-devel-0:2.6.24.7-81.el5rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@2.6.24.7-81.el5rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"product_id": "kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@2.6.24.7-81.el5rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:2.6.24.7-81.el5rt.x86_64",
"product": {
"name": "kernel-rt-debug-0:2.6.24.7-81.el5rt.x86_64",
"product_id": "kernel-rt-debug-0:2.6.24.7-81.el5rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@2.6.24.7-81.el5rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-0:2.6.24.7-81.el5rt.x86_64",
"product": {
"name": "kernel-rt-0:2.6.24.7-81.el5rt.x86_64",
"product_id": "kernel-rt-0:2.6.24.7-81.el5rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-81.el5rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.x86_64",
"product": {
"name": "kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.x86_64",
"product_id": "kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-devel@2.6.24.7-81.el5rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.x86_64",
"product_id": "kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common@2.6.24.7-81.el5rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.x86_64",
"product_id": "kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@2.6.24.7-81.el5rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.x86_64",
"product": {
"name": "kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.x86_64",
"product_id": "kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@2.6.24.7-81.el5rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"product": {
"name": "kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"product_id": "kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@2.6.24.7-81.el5rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@2.6.24.7-81.el5rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"product": {
"name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"product_id": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@2.6.24.7-81.el5rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-0:2.6.24.7-81.el5rt.x86_64",
"product": {
"name": "kernel-rt-trace-0:2.6.24.7-81.el5rt.x86_64",
"product_id": "kernel-rt-trace-0:2.6.24.7-81.el5rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace@2.6.24.7-81.el5rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-vanilla-0:2.6.24.7-81.el5rt.x86_64",
"product": {
"name": "kernel-rt-vanilla-0:2.6.24.7-81.el5rt.x86_64",
"product_id": "kernel-rt-vanilla-0:2.6.24.7-81.el5rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-vanilla@2.6.24.7-81.el5rt?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:2.6.24.7-81.el5rt.src",
"product": {
"name": "kernel-rt-0:2.6.24.7-81.el5rt.src",
"product_id": "kernel-rt-0:2.6.24.7-81.el5rt.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-81.el5rt?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-doc-0:2.6.24.7-81.el5rt.noarch",
"product": {
"name": "kernel-rt-doc-0:2.6.24.7-81.el5rt.noarch",
"product_id": "kernel-rt-doc-0:2.6.24.7-81.el5rt.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-doc@2.6.24.7-81.el5rt?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:2.6.24.7-81.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.i686"
},
"product_reference": "kernel-rt-0:2.6.24.7-81.el5rt.i686",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:2.6.24.7-81.el5rt.src as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.src"
},
"product_reference": "kernel-rt-0:2.6.24.7-81.el5rt.src",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:2.6.24.7-81.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.x86_64"
},
"product_reference": "kernel-rt-0:2.6.24.7-81.el5rt.x86_64",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:2.6.24.7-81.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.i686"
},
"product_reference": "kernel-rt-debug-0:2.6.24.7-81.el5rt.i686",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:2.6.24.7-81.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.x86_64"
},
"product_reference": "kernel-rt-debug-0:2.6.24.7-81.el5rt.x86_64",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.i686"
},
"product_reference": "kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.i686",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.i686"
},
"product_reference": "kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.i686",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.x86_64",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.i686"
},
"product_reference": "kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.i686",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.i686"
},
"product_reference": "kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.i686",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.x86_64",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:2.6.24.7-81.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.i686"
},
"product_reference": "kernel-rt-devel-0:2.6.24.7-81.el5rt.i686",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:2.6.24.7-81.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.x86_64"
},
"product_reference": "kernel-rt-devel-0:2.6.24.7-81.el5rt.x86_64",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-doc-0:2.6.24.7-81.el5rt.noarch as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-81.el5rt.noarch"
},
"product_reference": "kernel-rt-doc-0:2.6.24.7-81.el5rt.noarch",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-0:2.6.24.7-81.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.i686"
},
"product_reference": "kernel-rt-trace-0:2.6.24.7-81.el5rt.i686",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-0:2.6.24.7-81.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.x86_64"
},
"product_reference": "kernel-rt-trace-0:2.6.24.7-81.el5rt.x86_64",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.i686"
},
"product_reference": "kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.i686",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.x86_64"
},
"product_reference": "kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.i686"
},
"product_reference": "kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.i686",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.x86_64"
},
"product_reference": "kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.x86_64",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vanilla-0:2.6.24.7-81.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.i686"
},
"product_reference": "kernel-rt-vanilla-0:2.6.24.7-81.el5rt.i686",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vanilla-0:2.6.24.7-81.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.x86_64"
},
"product_reference": "kernel-rt-vanilla-0:2.6.24.7-81.el5rt.x86_64",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.i686"
},
"product_reference": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.i686",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.x86_64"
},
"product_reference": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.i686"
},
"product_reference": "kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.i686",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.x86_64"
},
"product_reference": "kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.x86_64",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2008-3272",
"discovery_date": "2008-08-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "457995"
}
],
"notes": [
{
"category": "description",
"text": "The snd_seq_oss_synth_make_info function in sound/core/seq/oss/seq_oss_synth.c in the sound subsystem in the Linux kernel before 2.6.27-rc2 does not verify that the device number is within the range defined by max_synthdev before returning certain data to the caller, which allows local users to obtain sensitive information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel snd_seq_oss_synth_make_info leak",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-81.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3272"
},
{
"category": "external",
"summary": "RHBZ#457995",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=457995"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3272",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3272"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3272",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3272"
}
],
"release_date": "2008-08-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-10-07T19:16:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-81.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0857"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel snd_seq_oss_synth_make_info leak"
},
{
"cve": "CVE-2008-3275",
"discovery_date": "2008-08-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "457858"
}
],
"notes": [
{
"category": "description",
"text": "The (1) real_lookup and (2) __lookup_hash functions in fs/namei.c in the vfs implementation in the Linux kernel before 2.6.25.15 do not prevent creation of a child dentry for a deleted (aka S_DEAD) directory, which allows local users to cause a denial of service (\"overflow\" of the UBIFS orphan area) via a series of attempted file creations within deleted directories.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Linux kernel local filesystem DoS",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-81.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3275"
},
{
"category": "external",
"summary": "RHBZ#457858",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=457858"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3275",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3275"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3275",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3275"
}
],
"release_date": "2008-07-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-10-07T19:16:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-81.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0857"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Linux kernel local filesystem DoS"
},
{
"cve": "CVE-2008-3276",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2008-08-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "459226"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in the dccp_setsockopt_change function in net/dccp/proto.c in the Datagram Congestion Control Protocol (DCCP) subsystem in the Linux kernel 2.6.17-rc1 through 2.6.26.2 allows remote attackers to cause a denial of service (panic) via a crafted integer value, related to Change L and Change R options without at least one byte in the dccpsf_val field.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Linux kernel dccp_setsockopt_change() integer overflow",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-81.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3276"
},
{
"category": "external",
"summary": "RHBZ#459226",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=459226"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3276",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3276"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3276",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3276"
}
],
"release_date": "2008-08-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-10-07T19:16:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-81.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0857"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Linux kernel dccp_setsockopt_change() integer overflow"
},
{
"cve": "CVE-2008-3526",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2008-08-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "460093"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in the sctp_setsockopt_auth_key function in net/sctp/socket.c in the Stream Control Transmission Protocol (sctp) implementation in the Linux kernel 2.6.24-rc1 through 2.6.26.3 allows remote attackers to cause a denial of service (panic) or possibly have unspecified other impact via a crafted sca_keylength field associated with the SCTP_AUTH_KEY option.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Linux kernel sctp_setsockopt_auth_key() integer overflow",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, 4, and 5.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-81.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3526"
},
{
"category": "external",
"summary": "RHBZ#460093",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=460093"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3526",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3526"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3526",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3526"
}
],
"release_date": "2008-08-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-10-07T19:16:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-81.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0857"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Linux kernel sctp_setsockopt_auth_key() integer overflow"
},
{
"cve": "CVE-2008-3534",
"discovery_date": "2008-07-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "457507"
}
],
"notes": [
{
"category": "description",
"text": "The shmem_delete_inode function in mm/shmem.c in the tmpfs implementation in the Linux kernel before 2.6.26.1 allows local users to cause a denial of service (system crash) via a certain sequence of file create, remove, and overwrite operations, as demonstrated by the insserv program, related to allocation of \"useless pages\" and improper maintenance of the i_blocks count.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tmpfs: fix kernel BUG in shmem_delete_inode",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, 4, and 5.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-81.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3534"
},
{
"category": "external",
"summary": "RHBZ#457507",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=457507"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3534",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3534"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3534",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3534"
}
],
"release_date": "2008-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-10-07T19:16:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-81.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0857"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: tmpfs: fix kernel BUG in shmem_delete_inode"
},
{
"cve": "CVE-2008-3535",
"cwe": {
"id": "CWE-193",
"name": "Off-by-one Error"
},
"discovery_date": "2008-07-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "457703"
}
],
"notes": [
{
"category": "description",
"text": "Off-by-one error in the iov_iter_advance function in mm/filemap.c in the Linux kernel before 2.6.27-rc2 allows local users to cause a denial of service (system crash) via a certain sequence of file I/O operations with readv and writev, as demonstrated by testcases/kernel/fs/ftest/ftest03 from the Linux Test Project.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: fix off-by-one error in iov_iter_advance()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, 4, and 5.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-81.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3535"
},
{
"category": "external",
"summary": "RHBZ#457703",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=457703"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3535",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3535"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3535",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3535"
}
],
"release_date": "2008-07-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-10-07T19:16:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-81.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0857"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: fix off-by-one error in iov_iter_advance()"
},
{
"cve": "CVE-2008-3792",
"discovery_date": "2008-08-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "459955"
}
],
"notes": [
{
"category": "description",
"text": "net/sctp/socket.c in the Stream Control Transmission Protocol (sctp) implementation in the Linux kernel before 2.6.26.4 does not verify that the SCTP-AUTH extension is enabled before proceeding with SCTP-AUTH API functions, which allows attackers to cause a denial of service (NULL pointer dereference and panic) via vectors that result in calls to (1) sctp_setsockopt_auth_chunk, (2) sctp_setsockopt_hmac_ident, (3) sctp_setsockopt_auth_key, (4) sctp_setsockopt_active_key, (5) sctp_setsockopt_del_key, (6) sctp_getsockopt_maxburst, (7) sctp_getsockopt_active_key, (8) sctp_getsockopt_peer_auth_chunks, or (9) sctp_getsockopt_local_auth_chunks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: sctp: fix potential panics in the SCTP-AUTH API",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, 4, and 5.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-81.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3792"
},
{
"category": "external",
"summary": "RHBZ#459955",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=459955"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3792",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3792"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3792",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3792"
}
],
"release_date": "2008-08-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-10-07T19:16:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-81.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0857"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: sctp: fix potential panics in the SCTP-AUTH API"
},
{
"cve": "CVE-2008-3915",
"discovery_date": "2008-09-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "461101"
}
],
"notes": [
{
"category": "description",
"text": "Buffer overflow in nfsd in the Linux kernel before 2.6.26.4, when NFSv4 is enabled, allows remote attackers to have an unknown impact via vectors related to decoding an NFSv4 acl.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: nfsd: fix buffer overrun decoding NFSv4 acl",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, 4, and 5.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-81.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3915"
},
{
"category": "external",
"summary": "RHBZ#461101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=461101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3915",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3915"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3915",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3915"
}
],
"release_date": "2008-09-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-10-07T19:16:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-81.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0857"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: nfsd: fix buffer overrun decoding NFSv4 acl"
},
{
"cve": "CVE-2008-4113",
"discovery_date": "2008-08-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "464514"
}
],
"notes": [
{
"category": "description",
"text": "The sctp_getsockopt_hmac_ident function in net/sctp/socket.c in the Stream Control Transmission Protocol (sctp) implementation in the Linux kernel before 2.6.26.4, when the SCTP-AUTH extension is enabled, relies on an untrusted length value to limit copying of data from kernel memory, which allows local users to obtain sensitive information via a crafted SCTP_HMAC_IDENT IOCTL request involving the sctp_getsockopt function.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: sctp_getsockopt_hmac_ident information disclosure",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, 4, and 5.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-81.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-4113"
},
{
"category": "external",
"summary": "RHBZ#464514",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=464514"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-4113",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4113"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-4113",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-4113"
}
],
"release_date": "2008-08-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-10-07T19:16:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-81.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0857"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: sctp_getsockopt_hmac_ident information disclosure"
},
{
"cve": "CVE-2008-4445",
"discovery_date": "2008-08-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "462599"
}
],
"notes": [
{
"category": "description",
"text": "The sctp_auth_ep_set_hmacs function in net/sctp/auth.c in the Stream Control Transmission Protocol (sctp) implementation in the Linux kernel before 2.6.26.4, when the SCTP-AUTH extension is enabled, does not verify that the identifier index is within the bounds established by SCTP_AUTH_HMAC_ID_MAX, which allows local users to obtain sensitive information via a crafted SCTP_HMAC_IDENT IOCTL request involving the sctp_getsockopt function, a different vulnerability than CVE-2008-4113.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: sctp: fix random memory dereference with SCTP_HMAC_IDENT option",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, 4, and 5.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-81.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-4445"
},
{
"category": "external",
"summary": "RHBZ#462599",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=462599"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-4445",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4445"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-4445",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-4445"
}
],
"release_date": "2008-08-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-10-07T19:16:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-81.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0857"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: sctp: fix random memory dereference with SCTP_HMAC_IDENT option"
}
]
}
RHSA-2008:0957
Vulnerability from csaf_redhat - Published: 2008-11-04 10:11 - Updated: 2025-11-21 17:33Linux kernel before 2.6.18, when running on x86_64 systems, does not properly save or restore EFLAGS during a context switch, which allows local users to cause a denial of service (crash) by causing SYSENTER to set an NT flag, which can trigger a crash on the IRET of the next task.
Xen 3.1.1 does not prevent modification of the CR4 TSC from applications, which allows pv guests to cause a denial of service (crash).
The Linux kernel 2.6.24 and 2.6.25 before 2.6.25.9 allows local users to cause a denial of service (memory consumption) via a large number of calls to the get_user_pages function, which lacks a ZERO_PAGE optimization and results in allocation of "useless newly zeroed pages."
Integer overflow in the dccp_setsockopt_change function in net/dccp/proto.c in the Datagram Congestion Control Protocol (DCCP) subsystem in the Linux kernel 2.6.17-rc1 through 2.6.26.2 allows remote attackers to cause a denial of service (panic) via a crafted integer value, related to Change L and Change R options without at least one byte in the dccpsf_val field.
CWE-190 - Integer Overflow or Wraparoundarch/i386/kernel/sysenter.c in the Virtual Dynamic Shared Objects (vDSO) implementation in the Linux kernel before 2.6.21 does not properly check boundaries, which allows local users to gain privileges or cause a denial of service via unspecified vectors, related to the install_special_mapping, syscall, and syscall32_nopage functions.
The generic_file_splice_write function in fs/splice.c in the Linux kernel before 2.6.19 does not properly strip setuid and setgid bits when there is a write to a file, which allows local users to gain the privileges of a different group, and obtain sensitive information or possibly have unspecified other impact, by splicing into an inode in order to create an executable file in a setgid directory, a different vulnerability than CVE-2008-4210.
fs/open.c in the Linux kernel before 2.6.22 does not properly strip setuid and setgid bits when there is a write to a file, which allows local users to gain the privileges of a different group, and obtain sensitive information or possibly have unspecified other impact, by creating an executable file in a setgid directory through the (1) truncate or (2) ftruncate function in conjunction with memory-mapped I/O.
fs/splice.c in the splice subsystem in the Linux kernel before 2.6.22.2 does not properly handle a failure of the add_to_page_cache_lru function, and subsequently attempts to unlock a page that was not locked, which allows local users to cause a denial of service (kernel BUG and system crash), as demonstrated by the fio I/O tool.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated kernel packages that resolve several security issues and fix\nvarious bugs are now available for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.\n\n[Updated 12th November 2008]\nThe original packages distributed with this errata had a bug which\nprevented the Xen kernel booting on older hardware. We have updated the\npackages to correct this bug.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\n* the Xen implementation did not prevent applications running in a\npara-virtualized guest from modifying CR4 TSC. This could cause a local\ndenial of service. (CVE-2007-5907, Important)\n\n* Tavis Ormandy reported missing boundary checks in the Virtual Dynamic\nShared Objects (vDSO) implementation. This could allow a local unprivileged\nuser to cause a denial of service or escalate privileges. (CVE-2008-3527,\nImportant)\n\n* the do_truncate() and generic_file_splice_write() functions did not clear\nthe setuid and setgid bits. This could allow a local unprivileged user to\nobtain access to privileged information. (CVE-2008-4210, CVE-2008-3833,\nImportant)\n\n* a flaw was found in the Linux kernel splice implementation. This could\ncause a local denial of service when there is a certain failure in the\nadd_to_page_cache_lru() function. (CVE-2008-4302, Important)\n\n* a flaw was found in the Linux kernel when running on AMD64 systems.\nDuring a context switch, EFLAGS were being neither saved nor restored. This\ncould allow a local unprivileged user to cause a denial of service.\n(CVE-2006-5755, Low)\n\n* a flaw was found in the Linux kernel virtual memory implementation. This\ncould allow a local unprivileged user to cause a denial of service.\n(CVE-2008-2372, Low)\n\n* an integer overflow was discovered in the Linux kernel Datagram\nCongestion Control Protocol (DCCP) implementation. This could allow a\nremote attacker to cause a denial of service. By default, remote DCCP is\nblocked by SELinux. (CVE-2008-3276, Low)\n\nIn addition, these updated packages fix the following bugs:\n\n* random32() seeding has been improved. \n\n* in a multi-core environment, a race between the QP async event-handler\nand the destro_qp() function could occur. This led to unpredictable results\nduring invalid memory access, which could lead to a kernel crash.\n\n* a format string was omitted in the call to the request_module() function.\n\n* a stack overflow caused by an infinite recursion bug in the binfmt_misc\nkernel module was corrected.\n\n* the ata_scsi_rbuf_get() and ata_scsi_rbuf_put() functions now check for\nscatterlist usage before calling kmap_atomic().\n\n* a sentinel NUL byte was added to the device_write() function to ensure\nthat lspace.name is NUL-terminated.\n\n* in the character device driver, a range_is_allowed() check was added to\nthe read_mem() and write_mem() functions. It was possible for an\nillegitimate application to bypass these checks, and access /dev/mem beyond\nthe 1M limit by calling mmap_mem() instead. Also, the parameters of\nrange_is_allowed() were changed to cleanly handle greater than 32-bits of\nphysical address on 32-bit architectures.\n\n* some of the newer Nehalem-based systems declare their CPU DSDT entries as\ntype \"Alias\". During boot, this caused an \"Error attaching device data\"\nmessage to be logged.\n\n* the evtchn event channel device lacked locks and memory barriers. This\nhas led to xenstore becoming unresponsive on the Itanium\u00ae architecture.\n\n* sending of gratuitous ARP packets in the Xen frontend network driver is\nnow delayed until the backend signals that its carrier status has been\nprocessed by the stack.\n\n* on forcedeth devices, whenever setting ethtool parameters for link speed,\nthe device could stop receiving interrupts.\n\n* the CIFS \u0027forcedirectio\u0027 option did not allow text to be appended to files.\n\n* the gettimeofday() function returned a backwards time on Intel\u00ae 64.\n\n* residual-count corrections during UNDERRUN handling were added to the\nqla2xxx driver. \n\n* the fix for a small quirk was removed for certain Adaptec controllers for\nwhich it caused problems.\n\n* the \"xm trigger init\" command caused a domain panic if a userland\napplication was running on a guest on the Intel\u00ae 64 architecture.\n\nUsers of kernel should upgrade to these updated packages, which contain\nbackported patches to correct these issues. ",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2008:0957",
"url": "https://access.redhat.com/errata/RHSA-2008:0957"
},
{
"category": "external",
"summary": "http://www.redhat.com/security/updates/classification/#important",
"url": "http://www.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "458021",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458021"
},
{
"category": "external",
"summary": "458759",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458759"
},
{
"category": "external",
"summary": "458781",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458781"
},
{
"category": "external",
"summary": "459226",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=459226"
},
{
"category": "external",
"summary": "459461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=459461"
},
{
"category": "external",
"summary": "459464",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=459464"
},
{
"category": "external",
"summary": "460251",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=460251"
},
{
"category": "external",
"summary": "377561",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=377561"
},
{
"category": "external",
"summary": "452666",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=452666"
},
{
"category": "external",
"summary": "457718",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=457718"
},
{
"category": "external",
"summary": "460638",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=460638"
},
{
"category": "external",
"summary": "460858",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=460858"
},
{
"category": "external",
"summary": "460868",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=460868"
},
{
"category": "external",
"summary": "461099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=461099"
},
{
"category": "external",
"summary": "461457",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=461457"
},
{
"category": "external",
"summary": "461894",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=461894"
},
{
"category": "external",
"summary": "462434",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=462434"
},
{
"category": "external",
"summary": "462591",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=462591"
},
{
"category": "external",
"summary": "462860",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=462860"
},
{
"category": "external",
"summary": "463661",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=463661"
},
{
"category": "external",
"summary": "464450",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=464450"
},
{
"category": "external",
"summary": "465741",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=465741"
},
{
"category": "external",
"summary": "466427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=466427"
},
{
"category": "external",
"summary": "466885",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=466885"
},
{
"category": "external",
"summary": "467105",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=467105"
},
{
"category": "external",
"summary": "470040",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=470040"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0957.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-11-21T17:33:55+00:00",
"generator": {
"date": "2025-11-21T17:33:55+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2008:0957",
"initial_release_date": "2008-11-04T10:11:00+00:00",
"revision_history": [
{
"date": "2008-11-04T10:11:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2008-11-12T04:34:44+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:33:55+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686",
"product_id": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-92.1.18.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686",
"product": {
"name": "kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686",
"product_id": "kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-92.1.18.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-92.1.18.el5.i686",
"product": {
"name": "kernel-devel-0:2.6.18-92.1.18.el5.i686",
"product_id": "kernel-devel-0:2.6.18-92.1.18.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-92.1.18.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-92.1.18.el5.i686",
"product": {
"name": "kernel-debug-devel-0:2.6.18-92.1.18.el5.i686",
"product_id": "kernel-debug-devel-0:2.6.18-92.1.18.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-92.1.18.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686",
"product_id": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-92.1.18.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-92.1.18.el5.i686",
"product": {
"name": "kernel-xen-0:2.6.18-92.1.18.el5.i686",
"product_id": "kernel-xen-0:2.6.18-92.1.18.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-92.1.18.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-92.1.18.el5.i686",
"product": {
"name": "kernel-debuginfo-0:2.6.18-92.1.18.el5.i686",
"product_id": "kernel-debuginfo-0:2.6.18-92.1.18.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-92.1.18.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686",
"product_id": "kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-92.1.18.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-92.1.18.el5.i686",
"product": {
"name": "kernel-0:2.6.18-92.1.18.el5.i686",
"product_id": "kernel-0:2.6.18-92.1.18.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-92.1.18.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-0:2.6.18-92.1.18.el5.i686",
"product": {
"name": "kernel-PAE-0:2.6.18-92.1.18.el5.i686",
"product_id": "kernel-PAE-0:2.6.18-92.1.18.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-92.1.18.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-92.1.18.el5.i686",
"product": {
"name": "kernel-xen-devel-0:2.6.18-92.1.18.el5.i686",
"product_id": "kernel-xen-devel-0:2.6.18-92.1.18.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-92.1.18.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686",
"product": {
"name": "kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686",
"product_id": "kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-92.1.18.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-92.1.18.el5.i686",
"product": {
"name": "kernel-debug-0:2.6.18-92.1.18.el5.i686",
"product_id": "kernel-debug-0:2.6.18-92.1.18.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-92.1.18.el5?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-92.1.18.el5.i386",
"product": {
"name": "kernel-headers-0:2.6.18-92.1.18.el5.i386",
"product_id": "kernel-headers-0:2.6.18-92.1.18.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.1.18.el5?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-92.1.18.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-92.1.18.el5.x86_64",
"product": {
"name": "kernel-devel-0:2.6.18-92.1.18.el5.x86_64",
"product_id": "kernel-devel-0:2.6.18-92.1.18.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-92.1.18.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-92.1.18.el5.x86_64",
"product": {
"name": "kernel-headers-0:2.6.18-92.1.18.el5.x86_64",
"product_id": "kernel-headers-0:2.6.18-92.1.18.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.1.18.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64",
"product_id": "kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-92.1.18.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64",
"product_id": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-92.1.18.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-92.1.18.el5.x86_64",
"product": {
"name": "kernel-xen-0:2.6.18-92.1.18.el5.x86_64",
"product_id": "kernel-xen-0:2.6.18-92.1.18.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-92.1.18.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"product_id": "kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-92.1.18.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"product_id": "kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-92.1.18.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-92.1.18.el5.x86_64",
"product": {
"name": "kernel-0:2.6.18-92.1.18.el5.x86_64",
"product_id": "kernel-0:2.6.18-92.1.18.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-92.1.18.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64",
"product": {
"name": "kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64",
"product_id": "kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-92.1.18.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-92.1.18.el5.x86_64",
"product": {
"name": "kernel-debug-0:2.6.18-92.1.18.el5.x86_64",
"product_id": "kernel-debug-0:2.6.18-92.1.18.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-92.1.18.el5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.18-92.1.18.el5.src",
"product": {
"name": "kernel-0:2.6.18-92.1.18.el5.src",
"product_id": "kernel-0:2.6.18-92.1.18.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-92.1.18.el5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:2.6.18-92.1.18.el5.noarch",
"product": {
"name": "kernel-doc-0:2.6.18-92.1.18.el5.noarch",
"product_id": "kernel-doc-0:2.6.18-92.1.18.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.18-92.1.18.el5?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"product_id": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-92.1.18.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-92.1.18.el5.ia64",
"product": {
"name": "kernel-devel-0:2.6.18-92.1.18.el5.ia64",
"product_id": "kernel-devel-0:2.6.18-92.1.18.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-92.1.18.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-92.1.18.el5.ia64",
"product": {
"name": "kernel-headers-0:2.6.18-92.1.18.el5.ia64",
"product_id": "kernel-headers-0:2.6.18-92.1.18.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.1.18.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64",
"product": {
"name": "kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64",
"product_id": "kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-92.1.18.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64",
"product_id": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-92.1.18.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-92.1.18.el5.ia64",
"product": {
"name": "kernel-xen-0:2.6.18-92.1.18.el5.ia64",
"product_id": "kernel-xen-0:2.6.18-92.1.18.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-92.1.18.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"product": {
"name": "kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"product_id": "kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-92.1.18.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"product_id": "kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-92.1.18.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-92.1.18.el5.ia64",
"product": {
"name": "kernel-0:2.6.18-92.1.18.el5.ia64",
"product_id": "kernel-0:2.6.18-92.1.18.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-92.1.18.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64",
"product": {
"name": "kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64",
"product_id": "kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-92.1.18.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-92.1.18.el5.ia64",
"product": {
"name": "kernel-debug-0:2.6.18-92.1.18.el5.ia64",
"product_id": "kernel-debug-0:2.6.18-92.1.18.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-92.1.18.el5?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"product_id": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-92.1.18.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64",
"product": {
"name": "kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64",
"product_id": "kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-92.1.18.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-92.1.18.el5.ppc64",
"product": {
"name": "kernel-devel-0:2.6.18-92.1.18.el5.ppc64",
"product_id": "kernel-devel-0:2.6.18-92.1.18.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-92.1.18.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-92.1.18.el5.ppc64",
"product": {
"name": "kernel-headers-0:2.6.18-92.1.18.el5.ppc64",
"product_id": "kernel-headers-0:2.6.18-92.1.18.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.1.18.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64",
"product": {
"name": "kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64",
"product_id": "kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-92.1.18.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64",
"product_id": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-92.1.18.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"product": {
"name": "kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"product_id": "kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-92.1.18.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-92.1.18.el5.ppc64",
"product": {
"name": "kernel-0:2.6.18-92.1.18.el5.ppc64",
"product_id": "kernel-0:2.6.18-92.1.18.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-92.1.18.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:2.6.18-92.1.18.el5.ppc64",
"product": {
"name": "kernel-kdump-0:2.6.18-92.1.18.el5.ppc64",
"product_id": "kernel-kdump-0:2.6.18-92.1.18.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-92.1.18.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-92.1.18.el5.ppc64",
"product": {
"name": "kernel-debug-0:2.6.18-92.1.18.el5.ppc64",
"product_id": "kernel-debug-0:2.6.18-92.1.18.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-92.1.18.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"product": {
"name": "kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"product_id": "kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-92.1.18.el5?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-92.1.18.el5.ppc",
"product": {
"name": "kernel-headers-0:2.6.18-92.1.18.el5.ppc",
"product_id": "kernel-headers-0:2.6.18-92.1.18.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.1.18.el5?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"product_id": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-92.1.18.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x",
"product": {
"name": "kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x",
"product_id": "kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-92.1.18.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-92.1.18.el5.s390x",
"product": {
"name": "kernel-devel-0:2.6.18-92.1.18.el5.s390x",
"product_id": "kernel-devel-0:2.6.18-92.1.18.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-92.1.18.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-92.1.18.el5.s390x",
"product": {
"name": "kernel-headers-0:2.6.18-92.1.18.el5.s390x",
"product_id": "kernel-headers-0:2.6.18-92.1.18.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.1.18.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x",
"product": {
"name": "kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x",
"product_id": "kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-92.1.18.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x",
"product_id": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-92.1.18.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"product": {
"name": "kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"product_id": "kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-92.1.18.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-92.1.18.el5.s390x",
"product": {
"name": "kernel-0:2.6.18-92.1.18.el5.s390x",
"product_id": "kernel-0:2.6.18-92.1.18.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-92.1.18.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:2.6.18-92.1.18.el5.s390x",
"product": {
"name": "kernel-kdump-0:2.6.18-92.1.18.el5.s390x",
"product_id": "kernel-kdump-0:2.6.18-92.1.18.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-92.1.18.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-92.1.18.el5.s390x",
"product": {
"name": "kernel-debug-0:2.6.18-92.1.18.el5.s390x",
"product_id": "kernel-debug-0:2.6.18-92.1.18.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-92.1.18.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"product_id": "kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-92.1.18.el5?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-92.1.18.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-92.1.18.el5.i686"
},
"product_reference": "kernel-0:2.6.18-92.1.18.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-92.1.18.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-92.1.18.el5.ia64"
},
"product_reference": "kernel-0:2.6.18-92.1.18.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-92.1.18.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-92.1.18.el5.ppc64"
},
"product_reference": "kernel-0:2.6.18-92.1.18.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-92.1.18.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-92.1.18.el5.s390x"
},
"product_reference": "kernel-0:2.6.18-92.1.18.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-92.1.18.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-92.1.18.el5.src"
},
"product_reference": "kernel-0:2.6.18-92.1.18.el5.src",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-92.1.18.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-92.1.18.el5.x86_64"
},
"product_reference": "kernel-0:2.6.18-92.1.18.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-0:2.6.18-92.1.18.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-PAE-0:2.6.18-92.1.18.el5.i686"
},
"product_reference": "kernel-PAE-0:2.6.18-92.1.18.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686"
},
"product_reference": "kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686"
},
"product_reference": "kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-92.1.18.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-0:2.6.18-92.1.18.el5.i686"
},
"product_reference": "kernel-debug-0:2.6.18-92.1.18.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-92.1.18.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-0:2.6.18-92.1.18.el5.ia64"
},
"product_reference": "kernel-debug-0:2.6.18-92.1.18.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-92.1.18.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-0:2.6.18-92.1.18.el5.ppc64"
},
"product_reference": "kernel-debug-0:2.6.18-92.1.18.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-92.1.18.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-0:2.6.18-92.1.18.el5.s390x"
},
"product_reference": "kernel-debug-0:2.6.18-92.1.18.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-92.1.18.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-0:2.6.18-92.1.18.el5.x86_64"
},
"product_reference": "kernel-debug-0:2.6.18-92.1.18.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-92.1.18.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.18-92.1.18.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-92.1.18.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.18-92.1.18.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-92.1.18.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-devel-0:2.6.18-92.1.18.el5.i686"
},
"product_reference": "kernel-devel-0:2.6.18-92.1.18.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-92.1.18.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-devel-0:2.6.18-92.1.18.el5.ia64"
},
"product_reference": "kernel-devel-0:2.6.18-92.1.18.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-92.1.18.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-devel-0:2.6.18-92.1.18.el5.ppc64"
},
"product_reference": "kernel-devel-0:2.6.18-92.1.18.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-92.1.18.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-devel-0:2.6.18-92.1.18.el5.s390x"
},
"product_reference": "kernel-devel-0:2.6.18-92.1.18.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-92.1.18.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-devel-0:2.6.18-92.1.18.el5.x86_64"
},
"product_reference": "kernel-devel-0:2.6.18-92.1.18.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.18-92.1.18.el5.noarch as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-doc-0:2.6.18-92.1.18.el5.noarch"
},
"product_reference": "kernel-doc-0:2.6.18-92.1.18.el5.noarch",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-92.1.18.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-92.1.18.el5.i386"
},
"product_reference": "kernel-headers-0:2.6.18-92.1.18.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-92.1.18.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-92.1.18.el5.ia64"
},
"product_reference": "kernel-headers-0:2.6.18-92.1.18.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-92.1.18.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc"
},
"product_reference": "kernel-headers-0:2.6.18-92.1.18.el5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-92.1.18.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc64"
},
"product_reference": "kernel-headers-0:2.6.18-92.1.18.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-92.1.18.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-92.1.18.el5.s390x"
},
"product_reference": "kernel-headers-0:2.6.18-92.1.18.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-92.1.18.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-92.1.18.el5.x86_64"
},
"product_reference": "kernel-headers-0:2.6.18-92.1.18.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.18-92.1.18.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64"
},
"product_reference": "kernel-kdump-0:2.6.18-92.1.18.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.18-92.1.18.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-kdump-0:2.6.18-92.1.18.el5.s390x"
},
"product_reference": "kernel-kdump-0:2.6.18-92.1.18.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64"
},
"product_reference": "kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-92.1.18.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-0:2.6.18-92.1.18.el5.i686"
},
"product_reference": "kernel-xen-0:2.6.18-92.1.18.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-92.1.18.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-0:2.6.18-92.1.18.el5.ia64"
},
"product_reference": "kernel-xen-0:2.6.18-92.1.18.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-92.1.18.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-0:2.6.18-92.1.18.el5.x86_64"
},
"product_reference": "kernel-xen-0:2.6.18-92.1.18.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-92.1.18.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686"
},
"product_reference": "kernel-xen-devel-0:2.6.18-92.1.18.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-92.1.18.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-92.1.18.el5.i686"
},
"product_reference": "kernel-0:2.6.18-92.1.18.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-92.1.18.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-92.1.18.el5.ia64"
},
"product_reference": "kernel-0:2.6.18-92.1.18.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-92.1.18.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-92.1.18.el5.ppc64"
},
"product_reference": "kernel-0:2.6.18-92.1.18.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-92.1.18.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-92.1.18.el5.s390x"
},
"product_reference": "kernel-0:2.6.18-92.1.18.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-92.1.18.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-92.1.18.el5.src"
},
"product_reference": "kernel-0:2.6.18-92.1.18.el5.src",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-92.1.18.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-92.1.18.el5.x86_64"
},
"product_reference": "kernel-0:2.6.18-92.1.18.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-0:2.6.18-92.1.18.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-PAE-0:2.6.18-92.1.18.el5.i686"
},
"product_reference": "kernel-PAE-0:2.6.18-92.1.18.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686"
},
"product_reference": "kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686"
},
"product_reference": "kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-92.1.18.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-0:2.6.18-92.1.18.el5.i686"
},
"product_reference": "kernel-debug-0:2.6.18-92.1.18.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-92.1.18.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-0:2.6.18-92.1.18.el5.ia64"
},
"product_reference": "kernel-debug-0:2.6.18-92.1.18.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-92.1.18.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-0:2.6.18-92.1.18.el5.ppc64"
},
"product_reference": "kernel-debug-0:2.6.18-92.1.18.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-92.1.18.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-0:2.6.18-92.1.18.el5.s390x"
},
"product_reference": "kernel-debug-0:2.6.18-92.1.18.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-92.1.18.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-0:2.6.18-92.1.18.el5.x86_64"
},
"product_reference": "kernel-debug-0:2.6.18-92.1.18.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-92.1.18.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.18-92.1.18.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-92.1.18.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.18-92.1.18.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-92.1.18.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-devel-0:2.6.18-92.1.18.el5.i686"
},
"product_reference": "kernel-devel-0:2.6.18-92.1.18.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-92.1.18.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-devel-0:2.6.18-92.1.18.el5.ia64"
},
"product_reference": "kernel-devel-0:2.6.18-92.1.18.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-92.1.18.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-devel-0:2.6.18-92.1.18.el5.ppc64"
},
"product_reference": "kernel-devel-0:2.6.18-92.1.18.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-92.1.18.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-devel-0:2.6.18-92.1.18.el5.s390x"
},
"product_reference": "kernel-devel-0:2.6.18-92.1.18.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-92.1.18.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-devel-0:2.6.18-92.1.18.el5.x86_64"
},
"product_reference": "kernel-devel-0:2.6.18-92.1.18.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.18-92.1.18.el5.noarch as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-doc-0:2.6.18-92.1.18.el5.noarch"
},
"product_reference": "kernel-doc-0:2.6.18-92.1.18.el5.noarch",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-92.1.18.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-92.1.18.el5.i386"
},
"product_reference": "kernel-headers-0:2.6.18-92.1.18.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-92.1.18.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-92.1.18.el5.ia64"
},
"product_reference": "kernel-headers-0:2.6.18-92.1.18.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-92.1.18.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc"
},
"product_reference": "kernel-headers-0:2.6.18-92.1.18.el5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-92.1.18.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc64"
},
"product_reference": "kernel-headers-0:2.6.18-92.1.18.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-92.1.18.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-92.1.18.el5.s390x"
},
"product_reference": "kernel-headers-0:2.6.18-92.1.18.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-92.1.18.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-92.1.18.el5.x86_64"
},
"product_reference": "kernel-headers-0:2.6.18-92.1.18.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.18-92.1.18.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64"
},
"product_reference": "kernel-kdump-0:2.6.18-92.1.18.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.18-92.1.18.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-kdump-0:2.6.18-92.1.18.el5.s390x"
},
"product_reference": "kernel-kdump-0:2.6.18-92.1.18.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64"
},
"product_reference": "kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-92.1.18.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-0:2.6.18-92.1.18.el5.i686"
},
"product_reference": "kernel-xen-0:2.6.18-92.1.18.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-92.1.18.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-0:2.6.18-92.1.18.el5.ia64"
},
"product_reference": "kernel-xen-0:2.6.18-92.1.18.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-92.1.18.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-0:2.6.18-92.1.18.el5.x86_64"
},
"product_reference": "kernel-xen-0:2.6.18-92.1.18.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-92.1.18.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686"
},
"product_reference": "kernel-xen-devel-0:2.6.18-92.1.18.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64",
"relates_to_product_reference": "5Server"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2006-5755",
"discovery_date": "2006-09-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "457718"
}
],
"notes": [
{
"category": "description",
"text": "Linux kernel before 2.6.18, when running on x86_64 systems, does not properly save or restore EFLAGS during a context switch, which allows local users to cause a denial of service (crash) by causing SYSENTER to set an NT flag, which can trigger a crash on the IRET of the next task.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: local denial of service due to NT bit leakage",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-0:2.6.18-92.1.18.el5.src",
"5Client:kernel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-92.1.18.el5.noarch",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.i386",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-0:2.6.18-92.1.18.el5.src",
"5Server:kernel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-92.1.18.el5.noarch",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.i386",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-5755"
},
{
"category": "external",
"summary": "RHBZ#457718",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=457718"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-5755",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-5755"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-5755",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-5755"
}
],
"release_date": "2006-09-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-11-04T10:11:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Client:kernel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-0:2.6.18-92.1.18.el5.src",
"5Client:kernel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-92.1.18.el5.noarch",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.i386",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-0:2.6.18-92.1.18.el5.src",
"5Server:kernel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-92.1.18.el5.noarch",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.i386",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0957"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: local denial of service due to NT bit leakage"
},
{
"cve": "CVE-2007-5907",
"discovery_date": "2007-11-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "377561"
}
],
"notes": [
{
"category": "description",
"text": "Xen 3.1.1 does not prevent modification of the CR4 TSC from applications, which allows pv guests to cause a denial of service (crash).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel-xen 3.1.1 does not prevent modification of the CR4 TSC from applications (DoS possible)",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-0:2.6.18-92.1.18.el5.src",
"5Client:kernel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-92.1.18.el5.noarch",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.i386",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-0:2.6.18-92.1.18.el5.src",
"5Server:kernel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-92.1.18.el5.noarch",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.i386",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-5907"
},
{
"category": "external",
"summary": "RHBZ#377561",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=377561"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-5907",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5907"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5907",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5907"
}
],
"release_date": "2007-10-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-11-04T10:11:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Client:kernel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-0:2.6.18-92.1.18.el5.src",
"5Client:kernel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-92.1.18.el5.noarch",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.i386",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-0:2.6.18-92.1.18.el5.src",
"5Server:kernel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-92.1.18.el5.noarch",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.i386",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0957"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel-xen 3.1.1 does not prevent modification of the CR4 TSC from applications (DoS possible)"
},
{
"cve": "CVE-2008-2372",
"discovery_date": "2008-06-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "452666"
}
],
"notes": [
{
"category": "description",
"text": "The Linux kernel 2.6.24 and 2.6.25 before 2.6.25.9 allows local users to cause a denial of service (memory consumption) via a large number of calls to the get_user_pages function, which lacks a ZERO_PAGE optimization and results in allocation of \"useless newly zeroed pages.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Reinstate ZERO_PAGE optimization in \u0027get_user_pages()\u0027 and fix XIP",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-0:2.6.18-92.1.18.el5.src",
"5Client:kernel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-92.1.18.el5.noarch",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.i386",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-0:2.6.18-92.1.18.el5.src",
"5Server:kernel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-92.1.18.el5.noarch",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.i386",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-2372"
},
{
"category": "external",
"summary": "RHBZ#452666",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=452666"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-2372",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2372"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-2372",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2372"
}
],
"release_date": "2008-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-11-04T10:11:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Client:kernel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-0:2.6.18-92.1.18.el5.src",
"5Client:kernel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-92.1.18.el5.noarch",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.i386",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-0:2.6.18-92.1.18.el5.src",
"5Server:kernel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-92.1.18.el5.noarch",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.i386",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0957"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: Reinstate ZERO_PAGE optimization in \u0027get_user_pages()\u0027 and fix XIP"
},
{
"cve": "CVE-2008-3276",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2008-08-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "459226"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in the dccp_setsockopt_change function in net/dccp/proto.c in the Datagram Congestion Control Protocol (DCCP) subsystem in the Linux kernel 2.6.17-rc1 through 2.6.26.2 allows remote attackers to cause a denial of service (panic) via a crafted integer value, related to Change L and Change R options without at least one byte in the dccpsf_val field.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Linux kernel dccp_setsockopt_change() integer overflow",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-0:2.6.18-92.1.18.el5.src",
"5Client:kernel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-92.1.18.el5.noarch",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.i386",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-0:2.6.18-92.1.18.el5.src",
"5Server:kernel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-92.1.18.el5.noarch",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.i386",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3276"
},
{
"category": "external",
"summary": "RHBZ#459226",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=459226"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3276",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3276"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3276",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3276"
}
],
"release_date": "2008-08-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-11-04T10:11:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Client:kernel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-0:2.6.18-92.1.18.el5.src",
"5Client:kernel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-92.1.18.el5.noarch",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.i386",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-0:2.6.18-92.1.18.el5.src",
"5Server:kernel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-92.1.18.el5.noarch",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.i386",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0957"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Linux kernel dccp_setsockopt_change() integer overflow"
},
{
"cve": "CVE-2008-3527",
"discovery_date": "2008-08-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "460251"
}
],
"notes": [
{
"category": "description",
"text": "arch/i386/kernel/sysenter.c in the Virtual Dynamic Shared Objects (vDSO) implementation in the Linux kernel before 2.6.21 does not properly check boundaries, which allows local users to gain privileges or cause a denial of service via unspecified vectors, related to the install_special_mapping, syscall, and syscall32_nopage functions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: missing boundary checks in syscall/syscall32_nopage()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, 4, and Red Hat Enterprise MRG.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-0:2.6.18-92.1.18.el5.src",
"5Client:kernel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-92.1.18.el5.noarch",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.i386",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-0:2.6.18-92.1.18.el5.src",
"5Server:kernel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-92.1.18.el5.noarch",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.i386",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3527"
},
{
"category": "external",
"summary": "RHBZ#460251",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=460251"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3527",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3527"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3527",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3527"
}
],
"release_date": "2008-11-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-11-04T10:11:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Client:kernel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-0:2.6.18-92.1.18.el5.src",
"5Client:kernel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-92.1.18.el5.noarch",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.i386",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-0:2.6.18-92.1.18.el5.src",
"5Server:kernel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-92.1.18.el5.noarch",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.i386",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0957"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: missing boundary checks in syscall/syscall32_nopage()"
},
{
"cve": "CVE-2008-3833",
"discovery_date": "2008-09-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "464450"
}
],
"notes": [
{
"category": "description",
"text": "The generic_file_splice_write function in fs/splice.c in the Linux kernel before 2.6.19 does not properly strip setuid and setgid bits when there is a write to a file, which allows local users to gain the privileges of a different group, and obtain sensitive information or possibly have unspecified other impact, by splicing into an inode in order to create an executable file in a setgid directory, a different vulnerability than CVE-2008-4210.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: remove SUID when splicing into an inode",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, 4, and Red Hat Enterprise MRG.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-0:2.6.18-92.1.18.el5.src",
"5Client:kernel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-92.1.18.el5.noarch",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.i386",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-0:2.6.18-92.1.18.el5.src",
"5Server:kernel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-92.1.18.el5.noarch",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.i386",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3833"
},
{
"category": "external",
"summary": "RHBZ#464450",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=464450"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3833",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3833"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3833",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3833"
}
],
"release_date": "2006-10-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-11-04T10:11:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Client:kernel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-0:2.6.18-92.1.18.el5.src",
"5Client:kernel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-92.1.18.el5.noarch",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.i386",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-0:2.6.18-92.1.18.el5.src",
"5Server:kernel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-92.1.18.el5.noarch",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.i386",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0957"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: remove SUID when splicing into an inode"
},
{
"cve": "CVE-2008-4210",
"discovery_date": "2008-09-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "463661"
}
],
"notes": [
{
"category": "description",
"text": "fs/open.c in the Linux kernel before 2.6.22 does not properly strip setuid and setgid bits when there is a write to a file, which allows local users to gain the privileges of a different group, and obtain sensitive information or possibly have unspecified other impact, by creating an executable file in a setgid directory through the (1) truncate or (2) ftruncate function in conjunction with memory-mapped I/O.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: open() call allows setgid bit when user is not in new file\u0027s group",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-0:2.6.18-92.1.18.el5.src",
"5Client:kernel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-92.1.18.el5.noarch",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.i386",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-0:2.6.18-92.1.18.el5.src",
"5Server:kernel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-92.1.18.el5.noarch",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.i386",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-4210"
},
{
"category": "external",
"summary": "RHBZ#463661",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=463661"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-4210",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4210"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-4210",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-4210"
}
],
"release_date": "2007-05-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-11-04T10:11:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Client:kernel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-0:2.6.18-92.1.18.el5.src",
"5Client:kernel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-92.1.18.el5.noarch",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.i386",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-0:2.6.18-92.1.18.el5.src",
"5Server:kernel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-92.1.18.el5.noarch",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.i386",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0957"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: open() call allows setgid bit when user is not in new file\u0027s group"
},
{
"cve": "CVE-2008-4302",
"discovery_date": "2008-09-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "462434"
}
],
"notes": [
{
"category": "description",
"text": "fs/splice.c in the splice subsystem in the Linux kernel before 2.6.22.2 does not properly handle a failure of the add_to_page_cache_lru function, and subsequently attempts to unlock a page that was not locked, which allows local users to cause a denial of service (kernel BUG and system crash), as demonstrated by the fio I/O tool.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: splice: fix bad unlock_page() in error case",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, 4, and Red Hat Enterprise MRG.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-0:2.6.18-92.1.18.el5.src",
"5Client:kernel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-92.1.18.el5.noarch",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.i386",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-0:2.6.18-92.1.18.el5.src",
"5Server:kernel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-92.1.18.el5.noarch",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.i386",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-4302"
},
{
"category": "external",
"summary": "RHBZ#462434",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=462434"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-4302",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4302"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-4302",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-4302"
}
],
"release_date": "2007-07-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-11-04T10:11:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Client:kernel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-0:2.6.18-92.1.18.el5.src",
"5Client:kernel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-92.1.18.el5.noarch",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.i386",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-0:2.6.18-92.1.18.el5.src",
"5Server:kernel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-92.1.18.el5.noarch",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.i386",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0957"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: splice: fix bad unlock_page() in error case"
}
]
}
RHSA-2008_0857
Vulnerability from csaf_redhat - Published: 2008-10-07 19:16 - Updated: 2024-11-22 02:26The snd_seq_oss_synth_make_info function in sound/core/seq/oss/seq_oss_synth.c in the sound subsystem in the Linux kernel before 2.6.27-rc2 does not verify that the device number is within the range defined by max_synthdev before returning certain data to the caller, which allows local users to obtain sensitive information.
The (1) real_lookup and (2) __lookup_hash functions in fs/namei.c in the vfs implementation in the Linux kernel before 2.6.25.15 do not prevent creation of a child dentry for a deleted (aka S_DEAD) directory, which allows local users to cause a denial of service ("overflow" of the UBIFS orphan area) via a series of attempted file creations within deleted directories.
Integer overflow in the dccp_setsockopt_change function in net/dccp/proto.c in the Datagram Congestion Control Protocol (DCCP) subsystem in the Linux kernel 2.6.17-rc1 through 2.6.26.2 allows remote attackers to cause a denial of service (panic) via a crafted integer value, related to Change L and Change R options without at least one byte in the dccpsf_val field.
CWE-190 - Integer Overflow or WraparoundInteger overflow in the sctp_setsockopt_auth_key function in net/sctp/socket.c in the Stream Control Transmission Protocol (sctp) implementation in the Linux kernel 2.6.24-rc1 through 2.6.26.3 allows remote attackers to cause a denial of service (panic) or possibly have unspecified other impact via a crafted sca_keylength field associated with the SCTP_AUTH_KEY option.
CWE-190 - Integer Overflow or WraparoundThe shmem_delete_inode function in mm/shmem.c in the tmpfs implementation in the Linux kernel before 2.6.26.1 allows local users to cause a denial of service (system crash) via a certain sequence of file create, remove, and overwrite operations, as demonstrated by the insserv program, related to allocation of "useless pages" and improper maintenance of the i_blocks count.
Off-by-one error in the iov_iter_advance function in mm/filemap.c in the Linux kernel before 2.6.27-rc2 allows local users to cause a denial of service (system crash) via a certain sequence of file I/O operations with readv and writev, as demonstrated by testcases/kernel/fs/ftest/ftest03 from the Linux Test Project.
CWE-193 - Off-by-one Errornet/sctp/socket.c in the Stream Control Transmission Protocol (sctp) implementation in the Linux kernel before 2.6.26.4 does not verify that the SCTP-AUTH extension is enabled before proceeding with SCTP-AUTH API functions, which allows attackers to cause a denial of service (NULL pointer dereference and panic) via vectors that result in calls to (1) sctp_setsockopt_auth_chunk, (2) sctp_setsockopt_hmac_ident, (3) sctp_setsockopt_auth_key, (4) sctp_setsockopt_active_key, (5) sctp_setsockopt_del_key, (6) sctp_getsockopt_maxburst, (7) sctp_getsockopt_active_key, (8) sctp_getsockopt_peer_auth_chunks, or (9) sctp_getsockopt_local_auth_chunks.
Buffer overflow in nfsd in the Linux kernel before 2.6.26.4, when NFSv4 is enabled, allows remote attackers to have an unknown impact via vectors related to decoding an NFSv4 acl.
The sctp_getsockopt_hmac_ident function in net/sctp/socket.c in the Stream Control Transmission Protocol (sctp) implementation in the Linux kernel before 2.6.26.4, when the SCTP-AUTH extension is enabled, relies on an untrusted length value to limit copying of data from kernel memory, which allows local users to obtain sensitive information via a crafted SCTP_HMAC_IDENT IOCTL request involving the sctp_getsockopt function.
The sctp_auth_ep_set_hmacs function in net/sctp/auth.c in the Stream Control Transmission Protocol (sctp) implementation in the Linux kernel before 2.6.26.4, when the SCTP-AUTH extension is enabled, does not verify that the identifier index is within the bounds established by SCTP_AUTH_HMAC_ID_MAX, which allows local users to obtain sensitive information via a crafted SCTP_HMAC_IDENT IOCTL request involving the sctp_getsockopt function, a different vulnerability than CVE-2008-4113.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated kernel packages that fix several security issues and several bugs\nare now available for Red Hat Enterprise MRG 1.0.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nA possible integer overflow was found in the Linux kernel Stream Control\nTransmission Protocol (SCTP) implementation. This could allow an attacker\nto cause a denial of service. (CVE-2008-3526, Important)\n\nA deficiency was found in the Linux kernel Stream Control Transmission\nProtocol (SCTP) Authentication Extension implementation. All the SCTP-AUTH\nsocket options could cause a kernel panic if the API was used when the\nextension is disabled. (CVE-2008-3792, Important)\n\nMissing boundary checks were reported in the Linux kernel SCTP\nimplementation. This could, potentially, cause information disclosure via a\nspecially crafted SCTP_HMAC_IDENT IOCTL request. (CVE-2008-4113,\nCVE-2008-4445, Important)\n\nTobias Klein reported a missing check in the Linux kernel\u0027s Open Sound\nSystem (OSS) implementation. This deficiency could lead to a possible\ninformation leak. (CVE-2008-3272, Moderate)\n\nA deficiency was found in the Linux kernel virtual filesystem (VFS)\nimplementation. This could allow a local unprivileged user to make a series\nof file creations within deleted directories, possibly causing a denial of\nservice. (CVE-2008-3275, Moderate)\n\nA flaw was found in the Linux kernel Network File System daemon (nfsd) when\nNFSv4 was enabled. Remote attackers could use this to cause a denial of\nservice via a buffer overflow. (CVE-2008-3915, Moderate)\n\nA possible integer overflow was discovered in the Linux kernel Datagram\nCongestion Control Protocol (DCCP) implementation. This could allow a\nremote attacker to cause a denial of service on a victim\u0027s machine.\n(CVE-2008-3276, Low)\n\nA deficiency was found in the Linux kernel tmpfs implementation. This could\nallow a local unprivileged user to make a certain sequence of file\noperations, possibly causing a denial of service. (CVE-2008-3534, Low)\n\nAn off-by-one error was found in the iov_iter_advance function. This could\nallow a local unprivileged user to cause a denial of service as\ndemonstrated by a testcase from the Linux Test Project. (CVE-2008-3535,\nLow)\n\nThese updated packages also fix the following bugs:\n\n* fixed a warning in the openib code.\n\n* increased MAX_STACK_TRACE_ENTRIES on the debug kernel variant.\n\n* enqueue deprioritized RT tasks to head of prio array.\n\n* use timer_pending() to test ipv6 FIB timers.\n\n* added a lower-bound check for the length field in PPPOE headers.\n\n* pppoe: unshare skb to avoid possible data loss.\n\n* using growisofs could cause oops due to the lack of proper sanity checks.\n\n* random seed improvement.\n\n* enabled the \"Panic on Oops\" feature.\n\n* fixed a portability issue in parse_pmtmr() due to variable type.\n\n* fixed sanity check in cifs/asn1.c.\n\n* fixed a bug introduced by a previous fix, related to the inode code.\n\n* added better sanity checks to dlm code.\n\n* dynamic ftrace enhancements. The daemon is no longer used.\n\n* fixed a format string bug in cpufreq.\n\n* avoid a potential kernel stack overflow in binfmt_misc.c\n\n* fixed the long boot-up time when CONFIG_PROVE_LOCKING is enabled.\n\n* use a better random seed for NAT port randomization.\n\n* a compat_semaphore was being handled as a regular semaphore due to\ncasting (qla2xxx driver).\n\nAll users of Red Hat Enterprise MRG should upgrade to these new packages,\nwhich address these vulnerabilities and fix these bugs.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2008:0857",
"url": "https://access.redhat.com/errata/RHSA-2008:0857"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "447942",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=447942"
},
{
"category": "external",
"summary": "448574",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=448574"
},
{
"category": "external",
"summary": "454270",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=454270"
},
{
"category": "external",
"summary": "457012",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=457012"
},
{
"category": "external",
"summary": "457014",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=457014"
},
{
"category": "external",
"summary": "457019",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=457019"
},
{
"category": "external",
"summary": "457027",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=457027"
},
{
"category": "external",
"summary": "457507",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=457507"
},
{
"category": "external",
"summary": "457703",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=457703"
},
{
"category": "external",
"summary": "457858",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=457858"
},
{
"category": "external",
"summary": "457995",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=457995"
},
{
"category": "external",
"summary": "458016",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458016"
},
{
"category": "external",
"summary": "458104",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458104"
},
{
"category": "external",
"summary": "458340",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458340"
},
{
"category": "external",
"summary": "458350",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458350"
},
{
"category": "external",
"summary": "458487",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458487"
},
{
"category": "external",
"summary": "458755",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458755"
},
{
"category": "external",
"summary": "458756",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458756"
},
{
"category": "external",
"summary": "458758",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458758"
},
{
"category": "external",
"summary": "459141",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=459141"
},
{
"category": "external",
"summary": "459226",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=459226"
},
{
"category": "external",
"summary": "459459",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=459459"
},
{
"category": "external",
"summary": "459462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=459462"
},
{
"category": "external",
"summary": "459478",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=459478"
},
{
"category": "external",
"summary": "459942",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=459942"
},
{
"category": "external",
"summary": "459955",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=459955"
},
{
"category": "external",
"summary": "460093",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=460093"
},
{
"category": "external",
"summary": "460455",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=460455"
},
{
"category": "external",
"summary": "461101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=461101"
},
{
"category": "external",
"summary": "462599",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=462599"
},
{
"category": "external",
"summary": "464514",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=464514"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0857.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2024-11-22T02:26:25+00:00",
"generator": {
"date": "2024-11-22T02:26:25+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2008:0857",
"initial_release_date": "2008-10-07T19:16:00+00:00",
"revision_history": [
{
"date": "2008-10-07T19:16:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2008-10-07T15:18:59+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T02:26:25+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "MRG Realtime for RHEL 5 Server",
"product": {
"name": "MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_mrg:1::el5"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise MRG for RHEL-5"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-devel-0:2.6.24.7-81.el5rt.i686",
"product": {
"name": "kernel-rt-devel-0:2.6.24.7-81.el5rt.i686",
"product_id": "kernel-rt-devel-0:2.6.24.7-81.el5rt.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@2.6.24.7-81.el5rt?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.i686",
"product": {
"name": "kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.i686",
"product_id": "kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@2.6.24.7-81.el5rt?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:2.6.24.7-81.el5rt.i686",
"product": {
"name": "kernel-rt-debug-0:2.6.24.7-81.el5rt.i686",
"product_id": "kernel-rt-debug-0:2.6.24.7-81.el5rt.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@2.6.24.7-81.el5rt?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-0:2.6.24.7-81.el5rt.i686",
"product": {
"name": "kernel-rt-0:2.6.24.7-81.el5rt.i686",
"product_id": "kernel-rt-0:2.6.24.7-81.el5rt.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-81.el5rt?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.i686",
"product": {
"name": "kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.i686",
"product_id": "kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-devel@2.6.24.7-81.el5rt?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.i686",
"product": {
"name": "kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.i686",
"product_id": "kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common@2.6.24.7-81.el5rt?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.i686",
"product": {
"name": "kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.i686",
"product_id": "kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@2.6.24.7-81.el5rt?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.i686",
"product": {
"name": "kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.i686",
"product_id": "kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@2.6.24.7-81.el5rt?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.i686",
"product": {
"name": "kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.i686",
"product_id": "kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@2.6.24.7-81.el5rt?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.i686",
"product": {
"name": "kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.i686",
"product_id": "kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@2.6.24.7-81.el5rt?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.i686",
"product": {
"name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.i686",
"product_id": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@2.6.24.7-81.el5rt?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-0:2.6.24.7-81.el5rt.i686",
"product": {
"name": "kernel-rt-trace-0:2.6.24.7-81.el5rt.i686",
"product_id": "kernel-rt-trace-0:2.6.24.7-81.el5rt.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace@2.6.24.7-81.el5rt?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-vanilla-0:2.6.24.7-81.el5rt.i686",
"product": {
"name": "kernel-rt-vanilla-0:2.6.24.7-81.el5rt.i686",
"product_id": "kernel-rt-vanilla-0:2.6.24.7-81.el5rt.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-vanilla@2.6.24.7-81.el5rt?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-devel-0:2.6.24.7-81.el5rt.x86_64",
"product": {
"name": "kernel-rt-devel-0:2.6.24.7-81.el5rt.x86_64",
"product_id": "kernel-rt-devel-0:2.6.24.7-81.el5rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@2.6.24.7-81.el5rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"product_id": "kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@2.6.24.7-81.el5rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:2.6.24.7-81.el5rt.x86_64",
"product": {
"name": "kernel-rt-debug-0:2.6.24.7-81.el5rt.x86_64",
"product_id": "kernel-rt-debug-0:2.6.24.7-81.el5rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@2.6.24.7-81.el5rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-0:2.6.24.7-81.el5rt.x86_64",
"product": {
"name": "kernel-rt-0:2.6.24.7-81.el5rt.x86_64",
"product_id": "kernel-rt-0:2.6.24.7-81.el5rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-81.el5rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.x86_64",
"product": {
"name": "kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.x86_64",
"product_id": "kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-devel@2.6.24.7-81.el5rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.x86_64",
"product_id": "kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common@2.6.24.7-81.el5rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.x86_64",
"product_id": "kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@2.6.24.7-81.el5rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.x86_64",
"product": {
"name": "kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.x86_64",
"product_id": "kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@2.6.24.7-81.el5rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"product": {
"name": "kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"product_id": "kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@2.6.24.7-81.el5rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@2.6.24.7-81.el5rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"product": {
"name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"product_id": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@2.6.24.7-81.el5rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-0:2.6.24.7-81.el5rt.x86_64",
"product": {
"name": "kernel-rt-trace-0:2.6.24.7-81.el5rt.x86_64",
"product_id": "kernel-rt-trace-0:2.6.24.7-81.el5rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace@2.6.24.7-81.el5rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-vanilla-0:2.6.24.7-81.el5rt.x86_64",
"product": {
"name": "kernel-rt-vanilla-0:2.6.24.7-81.el5rt.x86_64",
"product_id": "kernel-rt-vanilla-0:2.6.24.7-81.el5rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-vanilla@2.6.24.7-81.el5rt?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:2.6.24.7-81.el5rt.src",
"product": {
"name": "kernel-rt-0:2.6.24.7-81.el5rt.src",
"product_id": "kernel-rt-0:2.6.24.7-81.el5rt.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-81.el5rt?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-doc-0:2.6.24.7-81.el5rt.noarch",
"product": {
"name": "kernel-rt-doc-0:2.6.24.7-81.el5rt.noarch",
"product_id": "kernel-rt-doc-0:2.6.24.7-81.el5rt.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-doc@2.6.24.7-81.el5rt?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:2.6.24.7-81.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.i686"
},
"product_reference": "kernel-rt-0:2.6.24.7-81.el5rt.i686",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:2.6.24.7-81.el5rt.src as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.src"
},
"product_reference": "kernel-rt-0:2.6.24.7-81.el5rt.src",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:2.6.24.7-81.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.x86_64"
},
"product_reference": "kernel-rt-0:2.6.24.7-81.el5rt.x86_64",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:2.6.24.7-81.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.i686"
},
"product_reference": "kernel-rt-debug-0:2.6.24.7-81.el5rt.i686",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:2.6.24.7-81.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.x86_64"
},
"product_reference": "kernel-rt-debug-0:2.6.24.7-81.el5rt.x86_64",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.i686"
},
"product_reference": "kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.i686",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.i686"
},
"product_reference": "kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.i686",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.x86_64",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.i686"
},
"product_reference": "kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.i686",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.i686"
},
"product_reference": "kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.i686",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.x86_64",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:2.6.24.7-81.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.i686"
},
"product_reference": "kernel-rt-devel-0:2.6.24.7-81.el5rt.i686",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:2.6.24.7-81.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.x86_64"
},
"product_reference": "kernel-rt-devel-0:2.6.24.7-81.el5rt.x86_64",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-doc-0:2.6.24.7-81.el5rt.noarch as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-81.el5rt.noarch"
},
"product_reference": "kernel-rt-doc-0:2.6.24.7-81.el5rt.noarch",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-0:2.6.24.7-81.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.i686"
},
"product_reference": "kernel-rt-trace-0:2.6.24.7-81.el5rt.i686",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-0:2.6.24.7-81.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.x86_64"
},
"product_reference": "kernel-rt-trace-0:2.6.24.7-81.el5rt.x86_64",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.i686"
},
"product_reference": "kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.i686",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.x86_64"
},
"product_reference": "kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.i686"
},
"product_reference": "kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.i686",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.x86_64"
},
"product_reference": "kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.x86_64",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vanilla-0:2.6.24.7-81.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.i686"
},
"product_reference": "kernel-rt-vanilla-0:2.6.24.7-81.el5rt.i686",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vanilla-0:2.6.24.7-81.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.x86_64"
},
"product_reference": "kernel-rt-vanilla-0:2.6.24.7-81.el5rt.x86_64",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.i686"
},
"product_reference": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.i686",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.x86_64"
},
"product_reference": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.i686"
},
"product_reference": "kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.i686",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
"product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.x86_64"
},
"product_reference": "kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.x86_64",
"relates_to_product_reference": "5Server-MRG-Realtime-1.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2008-3272",
"discovery_date": "2008-08-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "457995"
}
],
"notes": [
{
"category": "description",
"text": "The snd_seq_oss_synth_make_info function in sound/core/seq/oss/seq_oss_synth.c in the sound subsystem in the Linux kernel before 2.6.27-rc2 does not verify that the device number is within the range defined by max_synthdev before returning certain data to the caller, which allows local users to obtain sensitive information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel snd_seq_oss_synth_make_info leak",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-81.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3272"
},
{
"category": "external",
"summary": "RHBZ#457995",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=457995"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3272",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3272"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3272",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3272"
}
],
"release_date": "2008-08-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-10-07T19:16:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-81.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0857"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel snd_seq_oss_synth_make_info leak"
},
{
"cve": "CVE-2008-3275",
"discovery_date": "2008-08-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "457858"
}
],
"notes": [
{
"category": "description",
"text": "The (1) real_lookup and (2) __lookup_hash functions in fs/namei.c in the vfs implementation in the Linux kernel before 2.6.25.15 do not prevent creation of a child dentry for a deleted (aka S_DEAD) directory, which allows local users to cause a denial of service (\"overflow\" of the UBIFS orphan area) via a series of attempted file creations within deleted directories.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Linux kernel local filesystem DoS",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-81.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3275"
},
{
"category": "external",
"summary": "RHBZ#457858",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=457858"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3275",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3275"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3275",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3275"
}
],
"release_date": "2008-07-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-10-07T19:16:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-81.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0857"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Linux kernel local filesystem DoS"
},
{
"cve": "CVE-2008-3276",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2008-08-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "459226"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in the dccp_setsockopt_change function in net/dccp/proto.c in the Datagram Congestion Control Protocol (DCCP) subsystem in the Linux kernel 2.6.17-rc1 through 2.6.26.2 allows remote attackers to cause a denial of service (panic) via a crafted integer value, related to Change L and Change R options without at least one byte in the dccpsf_val field.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Linux kernel dccp_setsockopt_change() integer overflow",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-81.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3276"
},
{
"category": "external",
"summary": "RHBZ#459226",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=459226"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3276",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3276"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3276",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3276"
}
],
"release_date": "2008-08-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-10-07T19:16:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-81.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0857"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Linux kernel dccp_setsockopt_change() integer overflow"
},
{
"cve": "CVE-2008-3526",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2008-08-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "460093"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in the sctp_setsockopt_auth_key function in net/sctp/socket.c in the Stream Control Transmission Protocol (sctp) implementation in the Linux kernel 2.6.24-rc1 through 2.6.26.3 allows remote attackers to cause a denial of service (panic) or possibly have unspecified other impact via a crafted sca_keylength field associated with the SCTP_AUTH_KEY option.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Linux kernel sctp_setsockopt_auth_key() integer overflow",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, 4, and 5.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-81.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3526"
},
{
"category": "external",
"summary": "RHBZ#460093",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=460093"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3526",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3526"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3526",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3526"
}
],
"release_date": "2008-08-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-10-07T19:16:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-81.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0857"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Linux kernel sctp_setsockopt_auth_key() integer overflow"
},
{
"cve": "CVE-2008-3534",
"discovery_date": "2008-07-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "457507"
}
],
"notes": [
{
"category": "description",
"text": "The shmem_delete_inode function in mm/shmem.c in the tmpfs implementation in the Linux kernel before 2.6.26.1 allows local users to cause a denial of service (system crash) via a certain sequence of file create, remove, and overwrite operations, as demonstrated by the insserv program, related to allocation of \"useless pages\" and improper maintenance of the i_blocks count.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tmpfs: fix kernel BUG in shmem_delete_inode",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, 4, and 5.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-81.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3534"
},
{
"category": "external",
"summary": "RHBZ#457507",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=457507"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3534",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3534"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3534",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3534"
}
],
"release_date": "2008-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-10-07T19:16:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-81.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0857"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: tmpfs: fix kernel BUG in shmem_delete_inode"
},
{
"cve": "CVE-2008-3535",
"cwe": {
"id": "CWE-193",
"name": "Off-by-one Error"
},
"discovery_date": "2008-07-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "457703"
}
],
"notes": [
{
"category": "description",
"text": "Off-by-one error in the iov_iter_advance function in mm/filemap.c in the Linux kernel before 2.6.27-rc2 allows local users to cause a denial of service (system crash) via a certain sequence of file I/O operations with readv and writev, as demonstrated by testcases/kernel/fs/ftest/ftest03 from the Linux Test Project.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: fix off-by-one error in iov_iter_advance()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, 4, and 5.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-81.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3535"
},
{
"category": "external",
"summary": "RHBZ#457703",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=457703"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3535",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3535"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3535",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3535"
}
],
"release_date": "2008-07-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-10-07T19:16:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-81.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0857"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: fix off-by-one error in iov_iter_advance()"
},
{
"cve": "CVE-2008-3792",
"discovery_date": "2008-08-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "459955"
}
],
"notes": [
{
"category": "description",
"text": "net/sctp/socket.c in the Stream Control Transmission Protocol (sctp) implementation in the Linux kernel before 2.6.26.4 does not verify that the SCTP-AUTH extension is enabled before proceeding with SCTP-AUTH API functions, which allows attackers to cause a denial of service (NULL pointer dereference and panic) via vectors that result in calls to (1) sctp_setsockopt_auth_chunk, (2) sctp_setsockopt_hmac_ident, (3) sctp_setsockopt_auth_key, (4) sctp_setsockopt_active_key, (5) sctp_setsockopt_del_key, (6) sctp_getsockopt_maxburst, (7) sctp_getsockopt_active_key, (8) sctp_getsockopt_peer_auth_chunks, or (9) sctp_getsockopt_local_auth_chunks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: sctp: fix potential panics in the SCTP-AUTH API",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, 4, and 5.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-81.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3792"
},
{
"category": "external",
"summary": "RHBZ#459955",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=459955"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3792",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3792"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3792",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3792"
}
],
"release_date": "2008-08-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-10-07T19:16:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-81.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0857"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: sctp: fix potential panics in the SCTP-AUTH API"
},
{
"cve": "CVE-2008-3915",
"discovery_date": "2008-09-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "461101"
}
],
"notes": [
{
"category": "description",
"text": "Buffer overflow in nfsd in the Linux kernel before 2.6.26.4, when NFSv4 is enabled, allows remote attackers to have an unknown impact via vectors related to decoding an NFSv4 acl.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: nfsd: fix buffer overrun decoding NFSv4 acl",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, 4, and 5.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-81.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3915"
},
{
"category": "external",
"summary": "RHBZ#461101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=461101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3915",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3915"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3915",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3915"
}
],
"release_date": "2008-09-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-10-07T19:16:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-81.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0857"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: nfsd: fix buffer overrun decoding NFSv4 acl"
},
{
"cve": "CVE-2008-4113",
"discovery_date": "2008-08-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "464514"
}
],
"notes": [
{
"category": "description",
"text": "The sctp_getsockopt_hmac_ident function in net/sctp/socket.c in the Stream Control Transmission Protocol (sctp) implementation in the Linux kernel before 2.6.26.4, when the SCTP-AUTH extension is enabled, relies on an untrusted length value to limit copying of data from kernel memory, which allows local users to obtain sensitive information via a crafted SCTP_HMAC_IDENT IOCTL request involving the sctp_getsockopt function.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: sctp_getsockopt_hmac_ident information disclosure",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, 4, and 5.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-81.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-4113"
},
{
"category": "external",
"summary": "RHBZ#464514",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=464514"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-4113",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4113"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-4113",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-4113"
}
],
"release_date": "2008-08-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-10-07T19:16:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-81.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0857"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: sctp_getsockopt_hmac_ident information disclosure"
},
{
"cve": "CVE-2008-4445",
"discovery_date": "2008-08-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "462599"
}
],
"notes": [
{
"category": "description",
"text": "The sctp_auth_ep_set_hmacs function in net/sctp/auth.c in the Stream Control Transmission Protocol (sctp) implementation in the Linux kernel before 2.6.26.4, when the SCTP-AUTH extension is enabled, does not verify that the identifier index is within the bounds established by SCTP_AUTH_HMAC_ID_MAX, which allows local users to obtain sensitive information via a crafted SCTP_HMAC_IDENT IOCTL request involving the sctp_getsockopt function, a different vulnerability than CVE-2008-4113.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: sctp: fix random memory dereference with SCTP_HMAC_IDENT option",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, 4, and 5.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-81.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-4445"
},
{
"category": "external",
"summary": "RHBZ#462599",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=462599"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-4445",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4445"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-4445",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-4445"
}
],
"release_date": "2008-08-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-10-07T19:16:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.src",
"5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-81.el5rt.noarch",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-81.el5rt.x86_64",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.i686",
"5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-81.el5rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0857"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: sctp: fix random memory dereference with SCTP_HMAC_IDENT option"
}
]
}
RHSA-2008_0957
Vulnerability from csaf_redhat - Published: 2008-11-04 10:11 - Updated: 2024-11-22 02:21Linux kernel before 2.6.18, when running on x86_64 systems, does not properly save or restore EFLAGS during a context switch, which allows local users to cause a denial of service (crash) by causing SYSENTER to set an NT flag, which can trigger a crash on the IRET of the next task.
Xen 3.1.1 does not prevent modification of the CR4 TSC from applications, which allows pv guests to cause a denial of service (crash).
The Linux kernel 2.6.24 and 2.6.25 before 2.6.25.9 allows local users to cause a denial of service (memory consumption) via a large number of calls to the get_user_pages function, which lacks a ZERO_PAGE optimization and results in allocation of "useless newly zeroed pages."
Integer overflow in the dccp_setsockopt_change function in net/dccp/proto.c in the Datagram Congestion Control Protocol (DCCP) subsystem in the Linux kernel 2.6.17-rc1 through 2.6.26.2 allows remote attackers to cause a denial of service (panic) via a crafted integer value, related to Change L and Change R options without at least one byte in the dccpsf_val field.
CWE-190 - Integer Overflow or Wraparoundarch/i386/kernel/sysenter.c in the Virtual Dynamic Shared Objects (vDSO) implementation in the Linux kernel before 2.6.21 does not properly check boundaries, which allows local users to gain privileges or cause a denial of service via unspecified vectors, related to the install_special_mapping, syscall, and syscall32_nopage functions.
The generic_file_splice_write function in fs/splice.c in the Linux kernel before 2.6.19 does not properly strip setuid and setgid bits when there is a write to a file, which allows local users to gain the privileges of a different group, and obtain sensitive information or possibly have unspecified other impact, by splicing into an inode in order to create an executable file in a setgid directory, a different vulnerability than CVE-2008-4210.
fs/open.c in the Linux kernel before 2.6.22 does not properly strip setuid and setgid bits when there is a write to a file, which allows local users to gain the privileges of a different group, and obtain sensitive information or possibly have unspecified other impact, by creating an executable file in a setgid directory through the (1) truncate or (2) ftruncate function in conjunction with memory-mapped I/O.
fs/splice.c in the splice subsystem in the Linux kernel before 2.6.22.2 does not properly handle a failure of the add_to_page_cache_lru function, and subsequently attempts to unlock a page that was not locked, which allows local users to cause a denial of service (kernel BUG and system crash), as demonstrated by the fio I/O tool.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated kernel packages that resolve several security issues and fix\nvarious bugs are now available for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.\n\n[Updated 12th November 2008]\nThe original packages distributed with this errata had a bug which\nprevented the Xen kernel booting on older hardware. We have updated the\npackages to correct this bug.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\n* the Xen implementation did not prevent applications running in a\npara-virtualized guest from modifying CR4 TSC. This could cause a local\ndenial of service. (CVE-2007-5907, Important)\n\n* Tavis Ormandy reported missing boundary checks in the Virtual Dynamic\nShared Objects (vDSO) implementation. This could allow a local unprivileged\nuser to cause a denial of service or escalate privileges. (CVE-2008-3527,\nImportant)\n\n* the do_truncate() and generic_file_splice_write() functions did not clear\nthe setuid and setgid bits. This could allow a local unprivileged user to\nobtain access to privileged information. (CVE-2008-4210, CVE-2008-3833,\nImportant)\n\n* a flaw was found in the Linux kernel splice implementation. This could\ncause a local denial of service when there is a certain failure in the\nadd_to_page_cache_lru() function. (CVE-2008-4302, Important)\n\n* a flaw was found in the Linux kernel when running on AMD64 systems.\nDuring a context switch, EFLAGS were being neither saved nor restored. This\ncould allow a local unprivileged user to cause a denial of service.\n(CVE-2006-5755, Low)\n\n* a flaw was found in the Linux kernel virtual memory implementation. This\ncould allow a local unprivileged user to cause a denial of service.\n(CVE-2008-2372, Low)\n\n* an integer overflow was discovered in the Linux kernel Datagram\nCongestion Control Protocol (DCCP) implementation. This could allow a\nremote attacker to cause a denial of service. By default, remote DCCP is\nblocked by SELinux. (CVE-2008-3276, Low)\n\nIn addition, these updated packages fix the following bugs:\n\n* random32() seeding has been improved. \n\n* in a multi-core environment, a race between the QP async event-handler\nand the destro_qp() function could occur. This led to unpredictable results\nduring invalid memory access, which could lead to a kernel crash.\n\n* a format string was omitted in the call to the request_module() function.\n\n* a stack overflow caused by an infinite recursion bug in the binfmt_misc\nkernel module was corrected.\n\n* the ata_scsi_rbuf_get() and ata_scsi_rbuf_put() functions now check for\nscatterlist usage before calling kmap_atomic().\n\n* a sentinel NUL byte was added to the device_write() function to ensure\nthat lspace.name is NUL-terminated.\n\n* in the character device driver, a range_is_allowed() check was added to\nthe read_mem() and write_mem() functions. It was possible for an\nillegitimate application to bypass these checks, and access /dev/mem beyond\nthe 1M limit by calling mmap_mem() instead. Also, the parameters of\nrange_is_allowed() were changed to cleanly handle greater than 32-bits of\nphysical address on 32-bit architectures.\n\n* some of the newer Nehalem-based systems declare their CPU DSDT entries as\ntype \"Alias\". During boot, this caused an \"Error attaching device data\"\nmessage to be logged.\n\n* the evtchn event channel device lacked locks and memory barriers. This\nhas led to xenstore becoming unresponsive on the Itanium\u00ae architecture.\n\n* sending of gratuitous ARP packets in the Xen frontend network driver is\nnow delayed until the backend signals that its carrier status has been\nprocessed by the stack.\n\n* on forcedeth devices, whenever setting ethtool parameters for link speed,\nthe device could stop receiving interrupts.\n\n* the CIFS \u0027forcedirectio\u0027 option did not allow text to be appended to files.\n\n* the gettimeofday() function returned a backwards time on Intel\u00ae 64.\n\n* residual-count corrections during UNDERRUN handling were added to the\nqla2xxx driver. \n\n* the fix for a small quirk was removed for certain Adaptec controllers for\nwhich it caused problems.\n\n* the \"xm trigger init\" command caused a domain panic if a userland\napplication was running on a guest on the Intel\u00ae 64 architecture.\n\nUsers of kernel should upgrade to these updated packages, which contain\nbackported patches to correct these issues. ",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2008:0957",
"url": "https://access.redhat.com/errata/RHSA-2008:0957"
},
{
"category": "external",
"summary": "http://www.redhat.com/security/updates/classification/#important",
"url": "http://www.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "377561",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=377561"
},
{
"category": "external",
"summary": "452666",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=452666"
},
{
"category": "external",
"summary": "457718",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=457718"
},
{
"category": "external",
"summary": "458021",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458021"
},
{
"category": "external",
"summary": "458759",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458759"
},
{
"category": "external",
"summary": "458781",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458781"
},
{
"category": "external",
"summary": "459226",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=459226"
},
{
"category": "external",
"summary": "459461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=459461"
},
{
"category": "external",
"summary": "459464",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=459464"
},
{
"category": "external",
"summary": "460251",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=460251"
},
{
"category": "external",
"summary": "460638",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=460638"
},
{
"category": "external",
"summary": "460858",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=460858"
},
{
"category": "external",
"summary": "460868",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=460868"
},
{
"category": "external",
"summary": "461099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=461099"
},
{
"category": "external",
"summary": "461457",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=461457"
},
{
"category": "external",
"summary": "461894",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=461894"
},
{
"category": "external",
"summary": "462434",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=462434"
},
{
"category": "external",
"summary": "462591",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=462591"
},
{
"category": "external",
"summary": "462860",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=462860"
},
{
"category": "external",
"summary": "463661",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=463661"
},
{
"category": "external",
"summary": "464450",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=464450"
},
{
"category": "external",
"summary": "465741",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=465741"
},
{
"category": "external",
"summary": "466427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=466427"
},
{
"category": "external",
"summary": "466885",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=466885"
},
{
"category": "external",
"summary": "467105",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=467105"
},
{
"category": "external",
"summary": "470040",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=470040"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0957.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2024-11-22T02:21:23+00:00",
"generator": {
"date": "2024-11-22T02:21:23+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2008:0957",
"initial_release_date": "2008-11-04T10:11:00+00:00",
"revision_history": [
{
"date": "2008-11-04T10:11:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2008-11-12T04:34:44+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T02:21:23+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686",
"product_id": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-92.1.18.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686",
"product": {
"name": "kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686",
"product_id": "kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-92.1.18.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-92.1.18.el5.i686",
"product": {
"name": "kernel-devel-0:2.6.18-92.1.18.el5.i686",
"product_id": "kernel-devel-0:2.6.18-92.1.18.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-92.1.18.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-92.1.18.el5.i686",
"product": {
"name": "kernel-debug-devel-0:2.6.18-92.1.18.el5.i686",
"product_id": "kernel-debug-devel-0:2.6.18-92.1.18.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-92.1.18.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686",
"product_id": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-92.1.18.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-92.1.18.el5.i686",
"product": {
"name": "kernel-xen-0:2.6.18-92.1.18.el5.i686",
"product_id": "kernel-xen-0:2.6.18-92.1.18.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-92.1.18.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-92.1.18.el5.i686",
"product": {
"name": "kernel-debuginfo-0:2.6.18-92.1.18.el5.i686",
"product_id": "kernel-debuginfo-0:2.6.18-92.1.18.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-92.1.18.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686",
"product_id": "kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-92.1.18.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-92.1.18.el5.i686",
"product": {
"name": "kernel-0:2.6.18-92.1.18.el5.i686",
"product_id": "kernel-0:2.6.18-92.1.18.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-92.1.18.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-0:2.6.18-92.1.18.el5.i686",
"product": {
"name": "kernel-PAE-0:2.6.18-92.1.18.el5.i686",
"product_id": "kernel-PAE-0:2.6.18-92.1.18.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-92.1.18.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-92.1.18.el5.i686",
"product": {
"name": "kernel-xen-devel-0:2.6.18-92.1.18.el5.i686",
"product_id": "kernel-xen-devel-0:2.6.18-92.1.18.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-92.1.18.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686",
"product": {
"name": "kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686",
"product_id": "kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-92.1.18.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-92.1.18.el5.i686",
"product": {
"name": "kernel-debug-0:2.6.18-92.1.18.el5.i686",
"product_id": "kernel-debug-0:2.6.18-92.1.18.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-92.1.18.el5?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-92.1.18.el5.i386",
"product": {
"name": "kernel-headers-0:2.6.18-92.1.18.el5.i386",
"product_id": "kernel-headers-0:2.6.18-92.1.18.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.1.18.el5?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-92.1.18.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-92.1.18.el5.x86_64",
"product": {
"name": "kernel-devel-0:2.6.18-92.1.18.el5.x86_64",
"product_id": "kernel-devel-0:2.6.18-92.1.18.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-92.1.18.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-92.1.18.el5.x86_64",
"product": {
"name": "kernel-headers-0:2.6.18-92.1.18.el5.x86_64",
"product_id": "kernel-headers-0:2.6.18-92.1.18.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.1.18.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64",
"product_id": "kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-92.1.18.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64",
"product_id": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-92.1.18.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-92.1.18.el5.x86_64",
"product": {
"name": "kernel-xen-0:2.6.18-92.1.18.el5.x86_64",
"product_id": "kernel-xen-0:2.6.18-92.1.18.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-92.1.18.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"product_id": "kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-92.1.18.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"product_id": "kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-92.1.18.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-92.1.18.el5.x86_64",
"product": {
"name": "kernel-0:2.6.18-92.1.18.el5.x86_64",
"product_id": "kernel-0:2.6.18-92.1.18.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-92.1.18.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64",
"product": {
"name": "kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64",
"product_id": "kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-92.1.18.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-92.1.18.el5.x86_64",
"product": {
"name": "kernel-debug-0:2.6.18-92.1.18.el5.x86_64",
"product_id": "kernel-debug-0:2.6.18-92.1.18.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-92.1.18.el5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.18-92.1.18.el5.src",
"product": {
"name": "kernel-0:2.6.18-92.1.18.el5.src",
"product_id": "kernel-0:2.6.18-92.1.18.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-92.1.18.el5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:2.6.18-92.1.18.el5.noarch",
"product": {
"name": "kernel-doc-0:2.6.18-92.1.18.el5.noarch",
"product_id": "kernel-doc-0:2.6.18-92.1.18.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.18-92.1.18.el5?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"product_id": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-92.1.18.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-92.1.18.el5.ia64",
"product": {
"name": "kernel-devel-0:2.6.18-92.1.18.el5.ia64",
"product_id": "kernel-devel-0:2.6.18-92.1.18.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-92.1.18.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-92.1.18.el5.ia64",
"product": {
"name": "kernel-headers-0:2.6.18-92.1.18.el5.ia64",
"product_id": "kernel-headers-0:2.6.18-92.1.18.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.1.18.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64",
"product": {
"name": "kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64",
"product_id": "kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-92.1.18.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64",
"product_id": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-92.1.18.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-92.1.18.el5.ia64",
"product": {
"name": "kernel-xen-0:2.6.18-92.1.18.el5.ia64",
"product_id": "kernel-xen-0:2.6.18-92.1.18.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-92.1.18.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"product": {
"name": "kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"product_id": "kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-92.1.18.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"product_id": "kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-92.1.18.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-92.1.18.el5.ia64",
"product": {
"name": "kernel-0:2.6.18-92.1.18.el5.ia64",
"product_id": "kernel-0:2.6.18-92.1.18.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-92.1.18.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64",
"product": {
"name": "kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64",
"product_id": "kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-92.1.18.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-92.1.18.el5.ia64",
"product": {
"name": "kernel-debug-0:2.6.18-92.1.18.el5.ia64",
"product_id": "kernel-debug-0:2.6.18-92.1.18.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-92.1.18.el5?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"product_id": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-92.1.18.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64",
"product": {
"name": "kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64",
"product_id": "kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-92.1.18.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-92.1.18.el5.ppc64",
"product": {
"name": "kernel-devel-0:2.6.18-92.1.18.el5.ppc64",
"product_id": "kernel-devel-0:2.6.18-92.1.18.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-92.1.18.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-92.1.18.el5.ppc64",
"product": {
"name": "kernel-headers-0:2.6.18-92.1.18.el5.ppc64",
"product_id": "kernel-headers-0:2.6.18-92.1.18.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.1.18.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64",
"product": {
"name": "kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64",
"product_id": "kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-92.1.18.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64",
"product_id": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-92.1.18.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"product": {
"name": "kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"product_id": "kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-92.1.18.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-92.1.18.el5.ppc64",
"product": {
"name": "kernel-0:2.6.18-92.1.18.el5.ppc64",
"product_id": "kernel-0:2.6.18-92.1.18.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-92.1.18.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:2.6.18-92.1.18.el5.ppc64",
"product": {
"name": "kernel-kdump-0:2.6.18-92.1.18.el5.ppc64",
"product_id": "kernel-kdump-0:2.6.18-92.1.18.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-92.1.18.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-92.1.18.el5.ppc64",
"product": {
"name": "kernel-debug-0:2.6.18-92.1.18.el5.ppc64",
"product_id": "kernel-debug-0:2.6.18-92.1.18.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-92.1.18.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"product": {
"name": "kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"product_id": "kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-92.1.18.el5?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-92.1.18.el5.ppc",
"product": {
"name": "kernel-headers-0:2.6.18-92.1.18.el5.ppc",
"product_id": "kernel-headers-0:2.6.18-92.1.18.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.1.18.el5?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"product_id": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-92.1.18.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x",
"product": {
"name": "kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x",
"product_id": "kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-92.1.18.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-92.1.18.el5.s390x",
"product": {
"name": "kernel-devel-0:2.6.18-92.1.18.el5.s390x",
"product_id": "kernel-devel-0:2.6.18-92.1.18.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-92.1.18.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-92.1.18.el5.s390x",
"product": {
"name": "kernel-headers-0:2.6.18-92.1.18.el5.s390x",
"product_id": "kernel-headers-0:2.6.18-92.1.18.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.1.18.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x",
"product": {
"name": "kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x",
"product_id": "kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-92.1.18.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x",
"product_id": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-92.1.18.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"product": {
"name": "kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"product_id": "kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-92.1.18.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-92.1.18.el5.s390x",
"product": {
"name": "kernel-0:2.6.18-92.1.18.el5.s390x",
"product_id": "kernel-0:2.6.18-92.1.18.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-92.1.18.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:2.6.18-92.1.18.el5.s390x",
"product": {
"name": "kernel-kdump-0:2.6.18-92.1.18.el5.s390x",
"product_id": "kernel-kdump-0:2.6.18-92.1.18.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-92.1.18.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-92.1.18.el5.s390x",
"product": {
"name": "kernel-debug-0:2.6.18-92.1.18.el5.s390x",
"product_id": "kernel-debug-0:2.6.18-92.1.18.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-92.1.18.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"product_id": "kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-92.1.18.el5?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-92.1.18.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-92.1.18.el5.i686"
},
"product_reference": "kernel-0:2.6.18-92.1.18.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-92.1.18.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-92.1.18.el5.ia64"
},
"product_reference": "kernel-0:2.6.18-92.1.18.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-92.1.18.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-92.1.18.el5.ppc64"
},
"product_reference": "kernel-0:2.6.18-92.1.18.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-92.1.18.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-92.1.18.el5.s390x"
},
"product_reference": "kernel-0:2.6.18-92.1.18.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-92.1.18.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-92.1.18.el5.src"
},
"product_reference": "kernel-0:2.6.18-92.1.18.el5.src",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-92.1.18.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-92.1.18.el5.x86_64"
},
"product_reference": "kernel-0:2.6.18-92.1.18.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-0:2.6.18-92.1.18.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-PAE-0:2.6.18-92.1.18.el5.i686"
},
"product_reference": "kernel-PAE-0:2.6.18-92.1.18.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686"
},
"product_reference": "kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686"
},
"product_reference": "kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-92.1.18.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-0:2.6.18-92.1.18.el5.i686"
},
"product_reference": "kernel-debug-0:2.6.18-92.1.18.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-92.1.18.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-0:2.6.18-92.1.18.el5.ia64"
},
"product_reference": "kernel-debug-0:2.6.18-92.1.18.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-92.1.18.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-0:2.6.18-92.1.18.el5.ppc64"
},
"product_reference": "kernel-debug-0:2.6.18-92.1.18.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-92.1.18.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-0:2.6.18-92.1.18.el5.s390x"
},
"product_reference": "kernel-debug-0:2.6.18-92.1.18.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-92.1.18.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-0:2.6.18-92.1.18.el5.x86_64"
},
"product_reference": "kernel-debug-0:2.6.18-92.1.18.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-92.1.18.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.18-92.1.18.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-92.1.18.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.18-92.1.18.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-92.1.18.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-devel-0:2.6.18-92.1.18.el5.i686"
},
"product_reference": "kernel-devel-0:2.6.18-92.1.18.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-92.1.18.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-devel-0:2.6.18-92.1.18.el5.ia64"
},
"product_reference": "kernel-devel-0:2.6.18-92.1.18.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-92.1.18.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-devel-0:2.6.18-92.1.18.el5.ppc64"
},
"product_reference": "kernel-devel-0:2.6.18-92.1.18.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-92.1.18.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-devel-0:2.6.18-92.1.18.el5.s390x"
},
"product_reference": "kernel-devel-0:2.6.18-92.1.18.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-92.1.18.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-devel-0:2.6.18-92.1.18.el5.x86_64"
},
"product_reference": "kernel-devel-0:2.6.18-92.1.18.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.18-92.1.18.el5.noarch as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-doc-0:2.6.18-92.1.18.el5.noarch"
},
"product_reference": "kernel-doc-0:2.6.18-92.1.18.el5.noarch",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-92.1.18.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-92.1.18.el5.i386"
},
"product_reference": "kernel-headers-0:2.6.18-92.1.18.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-92.1.18.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-92.1.18.el5.ia64"
},
"product_reference": "kernel-headers-0:2.6.18-92.1.18.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-92.1.18.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc"
},
"product_reference": "kernel-headers-0:2.6.18-92.1.18.el5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-92.1.18.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc64"
},
"product_reference": "kernel-headers-0:2.6.18-92.1.18.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-92.1.18.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-92.1.18.el5.s390x"
},
"product_reference": "kernel-headers-0:2.6.18-92.1.18.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-92.1.18.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-92.1.18.el5.x86_64"
},
"product_reference": "kernel-headers-0:2.6.18-92.1.18.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.18-92.1.18.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64"
},
"product_reference": "kernel-kdump-0:2.6.18-92.1.18.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.18-92.1.18.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-kdump-0:2.6.18-92.1.18.el5.s390x"
},
"product_reference": "kernel-kdump-0:2.6.18-92.1.18.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64"
},
"product_reference": "kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-92.1.18.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-0:2.6.18-92.1.18.el5.i686"
},
"product_reference": "kernel-xen-0:2.6.18-92.1.18.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-92.1.18.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-0:2.6.18-92.1.18.el5.ia64"
},
"product_reference": "kernel-xen-0:2.6.18-92.1.18.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-92.1.18.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-0:2.6.18-92.1.18.el5.x86_64"
},
"product_reference": "kernel-xen-0:2.6.18-92.1.18.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-92.1.18.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686"
},
"product_reference": "kernel-xen-devel-0:2.6.18-92.1.18.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-92.1.18.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-92.1.18.el5.i686"
},
"product_reference": "kernel-0:2.6.18-92.1.18.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-92.1.18.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-92.1.18.el5.ia64"
},
"product_reference": "kernel-0:2.6.18-92.1.18.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-92.1.18.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-92.1.18.el5.ppc64"
},
"product_reference": "kernel-0:2.6.18-92.1.18.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-92.1.18.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-92.1.18.el5.s390x"
},
"product_reference": "kernel-0:2.6.18-92.1.18.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-92.1.18.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-92.1.18.el5.src"
},
"product_reference": "kernel-0:2.6.18-92.1.18.el5.src",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-92.1.18.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-92.1.18.el5.x86_64"
},
"product_reference": "kernel-0:2.6.18-92.1.18.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-0:2.6.18-92.1.18.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-PAE-0:2.6.18-92.1.18.el5.i686"
},
"product_reference": "kernel-PAE-0:2.6.18-92.1.18.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686"
},
"product_reference": "kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686"
},
"product_reference": "kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-92.1.18.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-0:2.6.18-92.1.18.el5.i686"
},
"product_reference": "kernel-debug-0:2.6.18-92.1.18.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-92.1.18.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-0:2.6.18-92.1.18.el5.ia64"
},
"product_reference": "kernel-debug-0:2.6.18-92.1.18.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-92.1.18.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-0:2.6.18-92.1.18.el5.ppc64"
},
"product_reference": "kernel-debug-0:2.6.18-92.1.18.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-92.1.18.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-0:2.6.18-92.1.18.el5.s390x"
},
"product_reference": "kernel-debug-0:2.6.18-92.1.18.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-92.1.18.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-0:2.6.18-92.1.18.el5.x86_64"
},
"product_reference": "kernel-debug-0:2.6.18-92.1.18.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-92.1.18.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.18-92.1.18.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-92.1.18.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.18-92.1.18.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-92.1.18.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-devel-0:2.6.18-92.1.18.el5.i686"
},
"product_reference": "kernel-devel-0:2.6.18-92.1.18.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-92.1.18.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-devel-0:2.6.18-92.1.18.el5.ia64"
},
"product_reference": "kernel-devel-0:2.6.18-92.1.18.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-92.1.18.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-devel-0:2.6.18-92.1.18.el5.ppc64"
},
"product_reference": "kernel-devel-0:2.6.18-92.1.18.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-92.1.18.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-devel-0:2.6.18-92.1.18.el5.s390x"
},
"product_reference": "kernel-devel-0:2.6.18-92.1.18.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-92.1.18.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-devel-0:2.6.18-92.1.18.el5.x86_64"
},
"product_reference": "kernel-devel-0:2.6.18-92.1.18.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.18-92.1.18.el5.noarch as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-doc-0:2.6.18-92.1.18.el5.noarch"
},
"product_reference": "kernel-doc-0:2.6.18-92.1.18.el5.noarch",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-92.1.18.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-92.1.18.el5.i386"
},
"product_reference": "kernel-headers-0:2.6.18-92.1.18.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-92.1.18.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-92.1.18.el5.ia64"
},
"product_reference": "kernel-headers-0:2.6.18-92.1.18.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-92.1.18.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc"
},
"product_reference": "kernel-headers-0:2.6.18-92.1.18.el5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-92.1.18.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc64"
},
"product_reference": "kernel-headers-0:2.6.18-92.1.18.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-92.1.18.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-92.1.18.el5.s390x"
},
"product_reference": "kernel-headers-0:2.6.18-92.1.18.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-92.1.18.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-92.1.18.el5.x86_64"
},
"product_reference": "kernel-headers-0:2.6.18-92.1.18.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.18-92.1.18.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64"
},
"product_reference": "kernel-kdump-0:2.6.18-92.1.18.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.18-92.1.18.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-kdump-0:2.6.18-92.1.18.el5.s390x"
},
"product_reference": "kernel-kdump-0:2.6.18-92.1.18.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64"
},
"product_reference": "kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-92.1.18.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-0:2.6.18-92.1.18.el5.i686"
},
"product_reference": "kernel-xen-0:2.6.18-92.1.18.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-92.1.18.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-0:2.6.18-92.1.18.el5.ia64"
},
"product_reference": "kernel-xen-0:2.6.18-92.1.18.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-92.1.18.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-0:2.6.18-92.1.18.el5.x86_64"
},
"product_reference": "kernel-xen-0:2.6.18-92.1.18.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-92.1.18.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686"
},
"product_reference": "kernel-xen-devel-0:2.6.18-92.1.18.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64",
"relates_to_product_reference": "5Server"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2006-5755",
"discovery_date": "2006-09-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "457718"
}
],
"notes": [
{
"category": "description",
"text": "Linux kernel before 2.6.18, when running on x86_64 systems, does not properly save or restore EFLAGS during a context switch, which allows local users to cause a denial of service (crash) by causing SYSENTER to set an NT flag, which can trigger a crash on the IRET of the next task.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: local denial of service due to NT bit leakage",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-0:2.6.18-92.1.18.el5.src",
"5Client:kernel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-92.1.18.el5.noarch",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.i386",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-0:2.6.18-92.1.18.el5.src",
"5Server:kernel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-92.1.18.el5.noarch",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.i386",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-5755"
},
{
"category": "external",
"summary": "RHBZ#457718",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=457718"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-5755",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-5755"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-5755",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-5755"
}
],
"release_date": "2006-09-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-11-04T10:11:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Client:kernel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-0:2.6.18-92.1.18.el5.src",
"5Client:kernel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-92.1.18.el5.noarch",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.i386",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-0:2.6.18-92.1.18.el5.src",
"5Server:kernel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-92.1.18.el5.noarch",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.i386",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0957"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: local denial of service due to NT bit leakage"
},
{
"cve": "CVE-2007-5907",
"discovery_date": "2007-11-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "377561"
}
],
"notes": [
{
"category": "description",
"text": "Xen 3.1.1 does not prevent modification of the CR4 TSC from applications, which allows pv guests to cause a denial of service (crash).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel-xen 3.1.1 does not prevent modification of the CR4 TSC from applications (DoS possible)",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-0:2.6.18-92.1.18.el5.src",
"5Client:kernel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-92.1.18.el5.noarch",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.i386",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-0:2.6.18-92.1.18.el5.src",
"5Server:kernel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-92.1.18.el5.noarch",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.i386",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-5907"
},
{
"category": "external",
"summary": "RHBZ#377561",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=377561"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-5907",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5907"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5907",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5907"
}
],
"release_date": "2007-10-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-11-04T10:11:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Client:kernel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-0:2.6.18-92.1.18.el5.src",
"5Client:kernel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-92.1.18.el5.noarch",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.i386",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-0:2.6.18-92.1.18.el5.src",
"5Server:kernel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-92.1.18.el5.noarch",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.i386",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0957"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel-xen 3.1.1 does not prevent modification of the CR4 TSC from applications (DoS possible)"
},
{
"cve": "CVE-2008-2372",
"discovery_date": "2008-06-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "452666"
}
],
"notes": [
{
"category": "description",
"text": "The Linux kernel 2.6.24 and 2.6.25 before 2.6.25.9 allows local users to cause a denial of service (memory consumption) via a large number of calls to the get_user_pages function, which lacks a ZERO_PAGE optimization and results in allocation of \"useless newly zeroed pages.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Reinstate ZERO_PAGE optimization in \u0027get_user_pages()\u0027 and fix XIP",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-0:2.6.18-92.1.18.el5.src",
"5Client:kernel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-92.1.18.el5.noarch",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.i386",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-0:2.6.18-92.1.18.el5.src",
"5Server:kernel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-92.1.18.el5.noarch",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.i386",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-2372"
},
{
"category": "external",
"summary": "RHBZ#452666",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=452666"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-2372",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2372"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-2372",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2372"
}
],
"release_date": "2008-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-11-04T10:11:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Client:kernel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-0:2.6.18-92.1.18.el5.src",
"5Client:kernel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-92.1.18.el5.noarch",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.i386",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-0:2.6.18-92.1.18.el5.src",
"5Server:kernel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-92.1.18.el5.noarch",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.i386",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0957"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: Reinstate ZERO_PAGE optimization in \u0027get_user_pages()\u0027 and fix XIP"
},
{
"cve": "CVE-2008-3276",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2008-08-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "459226"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in the dccp_setsockopt_change function in net/dccp/proto.c in the Datagram Congestion Control Protocol (DCCP) subsystem in the Linux kernel 2.6.17-rc1 through 2.6.26.2 allows remote attackers to cause a denial of service (panic) via a crafted integer value, related to Change L and Change R options without at least one byte in the dccpsf_val field.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Linux kernel dccp_setsockopt_change() integer overflow",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-0:2.6.18-92.1.18.el5.src",
"5Client:kernel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-92.1.18.el5.noarch",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.i386",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-0:2.6.18-92.1.18.el5.src",
"5Server:kernel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-92.1.18.el5.noarch",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.i386",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3276"
},
{
"category": "external",
"summary": "RHBZ#459226",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=459226"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3276",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3276"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3276",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3276"
}
],
"release_date": "2008-08-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-11-04T10:11:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Client:kernel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-0:2.6.18-92.1.18.el5.src",
"5Client:kernel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-92.1.18.el5.noarch",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.i386",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-0:2.6.18-92.1.18.el5.src",
"5Server:kernel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-92.1.18.el5.noarch",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.i386",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0957"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Linux kernel dccp_setsockopt_change() integer overflow"
},
{
"cve": "CVE-2008-3527",
"discovery_date": "2008-08-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "460251"
}
],
"notes": [
{
"category": "description",
"text": "arch/i386/kernel/sysenter.c in the Virtual Dynamic Shared Objects (vDSO) implementation in the Linux kernel before 2.6.21 does not properly check boundaries, which allows local users to gain privileges or cause a denial of service via unspecified vectors, related to the install_special_mapping, syscall, and syscall32_nopage functions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: missing boundary checks in syscall/syscall32_nopage()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, 4, and Red Hat Enterprise MRG.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-0:2.6.18-92.1.18.el5.src",
"5Client:kernel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-92.1.18.el5.noarch",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.i386",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-0:2.6.18-92.1.18.el5.src",
"5Server:kernel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-92.1.18.el5.noarch",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.i386",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3527"
},
{
"category": "external",
"summary": "RHBZ#460251",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=460251"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3527",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3527"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3527",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3527"
}
],
"release_date": "2008-11-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-11-04T10:11:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Client:kernel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-0:2.6.18-92.1.18.el5.src",
"5Client:kernel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-92.1.18.el5.noarch",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.i386",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-0:2.6.18-92.1.18.el5.src",
"5Server:kernel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-92.1.18.el5.noarch",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.i386",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0957"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: missing boundary checks in syscall/syscall32_nopage()"
},
{
"cve": "CVE-2008-3833",
"discovery_date": "2008-09-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "464450"
}
],
"notes": [
{
"category": "description",
"text": "The generic_file_splice_write function in fs/splice.c in the Linux kernel before 2.6.19 does not properly strip setuid and setgid bits when there is a write to a file, which allows local users to gain the privileges of a different group, and obtain sensitive information or possibly have unspecified other impact, by splicing into an inode in order to create an executable file in a setgid directory, a different vulnerability than CVE-2008-4210.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: remove SUID when splicing into an inode",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, 4, and Red Hat Enterprise MRG.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-0:2.6.18-92.1.18.el5.src",
"5Client:kernel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-92.1.18.el5.noarch",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.i386",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-0:2.6.18-92.1.18.el5.src",
"5Server:kernel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-92.1.18.el5.noarch",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.i386",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3833"
},
{
"category": "external",
"summary": "RHBZ#464450",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=464450"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3833",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3833"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3833",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3833"
}
],
"release_date": "2006-10-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-11-04T10:11:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Client:kernel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-0:2.6.18-92.1.18.el5.src",
"5Client:kernel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-92.1.18.el5.noarch",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.i386",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-0:2.6.18-92.1.18.el5.src",
"5Server:kernel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-92.1.18.el5.noarch",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.i386",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0957"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: remove SUID when splicing into an inode"
},
{
"cve": "CVE-2008-4210",
"discovery_date": "2008-09-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "463661"
}
],
"notes": [
{
"category": "description",
"text": "fs/open.c in the Linux kernel before 2.6.22 does not properly strip setuid and setgid bits when there is a write to a file, which allows local users to gain the privileges of a different group, and obtain sensitive information or possibly have unspecified other impact, by creating an executable file in a setgid directory through the (1) truncate or (2) ftruncate function in conjunction with memory-mapped I/O.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: open() call allows setgid bit when user is not in new file\u0027s group",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-0:2.6.18-92.1.18.el5.src",
"5Client:kernel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-92.1.18.el5.noarch",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.i386",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-0:2.6.18-92.1.18.el5.src",
"5Server:kernel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-92.1.18.el5.noarch",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.i386",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-4210"
},
{
"category": "external",
"summary": "RHBZ#463661",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=463661"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-4210",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4210"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-4210",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-4210"
}
],
"release_date": "2007-05-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-11-04T10:11:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Client:kernel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-0:2.6.18-92.1.18.el5.src",
"5Client:kernel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-92.1.18.el5.noarch",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.i386",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-0:2.6.18-92.1.18.el5.src",
"5Server:kernel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-92.1.18.el5.noarch",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.i386",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0957"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: open() call allows setgid bit when user is not in new file\u0027s group"
},
{
"cve": "CVE-2008-4302",
"discovery_date": "2008-09-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "462434"
}
],
"notes": [
{
"category": "description",
"text": "fs/splice.c in the splice subsystem in the Linux kernel before 2.6.22.2 does not properly handle a failure of the add_to_page_cache_lru function, and subsequently attempts to unlock a page that was not locked, which allows local users to cause a denial of service (kernel BUG and system crash), as demonstrated by the fio I/O tool.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: splice: fix bad unlock_page() in error case",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, 4, and Red Hat Enterprise MRG.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-0:2.6.18-92.1.18.el5.src",
"5Client:kernel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-92.1.18.el5.noarch",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.i386",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-0:2.6.18-92.1.18.el5.src",
"5Server:kernel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-92.1.18.el5.noarch",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.i386",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-4302"
},
{
"category": "external",
"summary": "RHBZ#462434",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=462434"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-4302",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4302"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-4302",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-4302"
}
],
"release_date": "2007-07-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-11-04T10:11:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Client:kernel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-0:2.6.18-92.1.18.el5.src",
"5Client:kernel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-92.1.18.el5.noarch",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.i386",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-headers-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-0:2.6.18-92.1.18.el5.src",
"5Server:kernel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-devel-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-92.1.18.el5.noarch",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.i386",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-headers-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0957"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: splice: fix bad unlock_page() in error case"
}
]
}
FKIE_CVE-2008-3276
Vulnerability from fkie_nvd - Published: 2008-08-18 17:41 - Updated: 2025-04-09 00:30| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.26.y.git%3Ba=commit%3Bh=3e8a0a559c66ee9e7468195691a56fefc3589740 | ||
| secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00008.html | ||
| secalert@redhat.com | http://secunia.com/advisories/31509 | ||
| secalert@redhat.com | http://secunia.com/advisories/31836 | ||
| secalert@redhat.com | http://secunia.com/advisories/31881 | ||
| secalert@redhat.com | http://secunia.com/advisories/32190 | ||
| secalert@redhat.com | http://secunia.com/advisories/32237 | ||
| secalert@redhat.com | http://secunia.com/advisories/32370 | ||
| secalert@redhat.com | http://secunia.com/advisories/32393 | ||
| secalert@redhat.com | http://secunia.com/advisories/32485 | ||
| secalert@redhat.com | http://www.debian.org/security/2008/dsa-1636 | ||
| secalert@redhat.com | http://www.debian.org/security/2008/dsa-1653 | ||
| secalert@redhat.com | http://www.openwall.com/lists/oss-security/2008/08/15/3 | ||
| secalert@redhat.com | http://www.redhat.com/support/errata/RHSA-2008-0857.html | ||
| secalert@redhat.com | http://www.redhat.com/support/errata/RHSA-2008-0957.html | ||
| secalert@redhat.com | http://www.securityfocus.com/bid/30704 | ||
| secalert@redhat.com | http://www.securitytracker.com/id?1020705 | ||
| secalert@redhat.com | http://www.ubuntu.com/usn/usn-659-1 | ||
| secalert@redhat.com | http://www.vupen.com/english/advisories/2008/2406 | ||
| secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=459226 | ||
| secalert@redhat.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11506 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.26.y.git%3Ba=commit%3Bh=3e8a0a559c66ee9e7468195691a56fefc3589740 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00008.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31509 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31836 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31881 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/32190 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/32237 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/32370 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/32393 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/32485 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2008/dsa-1636 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2008/dsa-1653 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2008/08/15/3 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2008-0857.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2008-0957.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/30704 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1020705 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/usn-659-1 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/2406 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=459226 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11506 |
| Vendor | Product | Version | |
|---|---|---|---|
| linux | linux_kernel | 2.6.17 | |
| linux | linux_kernel | 2.6.17.1 | |
| linux | linux_kernel | 2.6.17.2 | |
| linux | linux_kernel | 2.6.17.3 | |
| linux | linux_kernel | 2.6.17.4 | |
| linux | linux_kernel | 2.6.17.5 | |
| linux | linux_kernel | 2.6.17.6 | |
| linux | linux_kernel | 2.6.17.7 | |
| linux | linux_kernel | 2.6.17.8 | |
| linux | linux_kernel | 2.6.17.9 | |
| linux | linux_kernel | 2.6.17.10 | |
| linux | linux_kernel | 2.6.17.11 | |
| linux | linux_kernel | 2.6.17.12 | |
| linux | linux_kernel | 2.6.17.13 | |
| linux | linux_kernel | 2.6.17.14 | |
| linux | linux_kernel | 2.6.18 | |
| linux | linux_kernel | 2.6.18.1 | |
| linux | linux_kernel | 2.6.18.2 | |
| linux | linux_kernel | 2.6.18.3 | |
| linux | linux_kernel | 2.6.18.4 | |
| linux | linux_kernel | 2.6.18.5 | |
| linux | linux_kernel | 2.6.18.6 | |
| linux | linux_kernel | 2.6.18.7 | |
| linux | linux_kernel | 2.6.18.8 | |
| linux | linux_kernel | 2.6.19 | |
| linux | linux_kernel | 2.6.19.1 | |
| linux | linux_kernel | 2.6.19.2 | |
| linux | linux_kernel | 2.6.19.3 | |
| linux | linux_kernel | 2.6.19.4 | |
| linux | linux_kernel | 2.6.19.5 | |
| linux | linux_kernel | 2.6.19.6 | |
| linux | linux_kernel | 2.6.19.7 | |
| linux | linux_kernel | 2.6.20 | |
| linux | linux_kernel | 2.6.20.1 | |
| linux | linux_kernel | 2.6.20.2 | |
| linux | linux_kernel | 2.6.20.3 | |
| linux | linux_kernel | 2.6.20.4 | |
| linux | linux_kernel | 2.6.20.5 | |
| linux | linux_kernel | 2.6.20.6 | |
| linux | linux_kernel | 2.6.20.7 | |
| linux | linux_kernel | 2.6.20.8 | |
| linux | linux_kernel | 2.6.20.9 | |
| linux | linux_kernel | 2.6.20.10 | |
| linux | linux_kernel | 2.6.20.11 | |
| linux | linux_kernel | 2.6.20.12 | |
| linux | linux_kernel | 2.6.20.13 | |
| linux | linux_kernel | 2.6.20.14 | |
| linux | linux_kernel | 2.6.20.15 | |
| linux | linux_kernel | 2.6.20.16 | |
| linux | linux_kernel | 2.6.20.17 | |
| linux | linux_kernel | 2.6.20.18 | |
| linux | linux_kernel | 2.6.20.19 | |
| linux | linux_kernel | 2.6.20.20 | |
| linux | linux_kernel | 2.6.20.21 | |
| linux | linux_kernel | 2.6.21 | |
| linux | linux_kernel | 2.6.21.1 | |
| linux | linux_kernel | 2.6.21.2 | |
| linux | linux_kernel | 2.6.21.3 | |
| linux | linux_kernel | 2.6.21.4 | |
| linux | linux_kernel | 2.6.21.5 | |
| linux | linux_kernel | 2.6.21.6 | |
| linux | linux_kernel | 2.6.21.7 | |
| linux | linux_kernel | 2.6.22 | |
| linux | linux_kernel | 2.6.22.1 | |
| linux | linux_kernel | 2.6.22.2 | |
| linux | linux_kernel | 2.6.22.3 | |
| linux | linux_kernel | 2.6.22.4 | |
| linux | linux_kernel | 2.6.22.5 | |
| linux | linux_kernel | 2.6.22.6 | |
| linux | linux_kernel | 2.6.22.7 | |
| linux | linux_kernel | 2.6.22.8 | |
| linux | linux_kernel | 2.6.22.9 | |
| linux | linux_kernel | 2.6.22.10 | |
| linux | linux_kernel | 2.6.22.11 | |
| linux | linux_kernel | 2.6.22.12 | |
| linux | linux_kernel | 2.6.22.13 | |
| linux | linux_kernel | 2.6.22.14 | |
| linux | linux_kernel | 2.6.22.15 | |
| linux | linux_kernel | 2.6.22.16 | |
| linux | linux_kernel | 2.6.22.17 | |
| linux | linux_kernel | 2.6.22.18 | |
| linux | linux_kernel | 2.6.22.19 | |
| linux | linux_kernel | 2.6.23 | |
| linux | linux_kernel | 2.6.23.1 | |
| linux | linux_kernel | 2.6.23.2 | |
| linux | linux_kernel | 2.6.23.3 | |
| linux | linux_kernel | 2.6.23.4 | |
| linux | linux_kernel | 2.6.23.5 | |
| linux | linux_kernel | 2.6.23.6 | |
| linux | linux_kernel | 2.6.23.7 | |
| linux | linux_kernel | 2.6.23.8 | |
| linux | linux_kernel | 2.6.23.9 | |
| linux | linux_kernel | 2.6.23.10 | |
| linux | linux_kernel | 2.6.23.11 | |
| linux | linux_kernel | 2.6.23.12 | |
| linux | linux_kernel | 2.6.23.13 | |
| linux | linux_kernel | 2.6.23.14 | |
| linux | linux_kernel | 2.6.23.15 | |
| linux | linux_kernel | 2.6.23.16 | |
| linux | linux_kernel | 2.6.23.17 | |
| linux | linux_kernel | 2.6.24 | |
| linux | linux_kernel | 2.6.24.1 | |
| linux | linux_kernel | 2.6.24.2 | |
| linux | linux_kernel | 2.6.24.3 | |
| linux | linux_kernel | 2.6.24.4 | |
| linux | linux_kernel | 2.6.24.5 | |
| linux | linux_kernel | 2.6.24.6 | |
| linux | linux_kernel | 2.6.24.7 | |
| linux | linux_kernel | 2.6.25 | |
| linux | linux_kernel | 2.6.25.1 | |
| linux | linux_kernel | 2.6.25.2 | |
| linux | linux_kernel | 2.6.25.3 | |
| linux | linux_kernel | 2.6.25.4 | |
| linux | linux_kernel | 2.6.25.5 | |
| linux | linux_kernel | 2.6.25.6 | |
| linux | linux_kernel | 2.6.25.7 | |
| linux | linux_kernel | 2.6.25.8 | |
| linux | linux_kernel | 2.6.25.9 | |
| linux | linux_kernel | 2.6.25.10 | |
| linux | linux_kernel | 2.6.25.11 | |
| linux | linux_kernel | 2.6.25.12 | |
| linux | linux_kernel | 2.6.25.13 | |
| linux | linux_kernel | 2.6.25.14 | |
| linux | linux_kernel | 2.6.25.15 | |
| linux | linux_kernel | 2.6.26 | |
| linux | linux_kernel | 2.6.26.2 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17:*:*:*:*:*:*:*",
"matchCriteriaId": "9E86E13B-EC92-47F3-94A9-DB515313011D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DEB3068F-2F64-4BBC-BA3C-FB56A2FBED50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6555D45B-D3B3-4455-AB1E-E513F9FB6139",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4FA5E262-7825-496F-AA72-0AD6DE6F3C78",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.4:*:*:*:*:*:*:*",
"matchCriteriaId": "56C6C01B-4CED-4F37-A415-0603496C27DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.5:*:*:*:*:*:*:*",
"matchCriteriaId": "9E62F6FA-6C96-4AEE-8547-8C2FE1FAD998",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.6:*:*:*:*:*:*:*",
"matchCriteriaId": "FE3ACE7A-A600-4ABB-B988-5D59D626DC0B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.7:*:*:*:*:*:*:*",
"matchCriteriaId": "2F839622-3DE1-4A16-8BD2-5FA2CBF014D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DC47887B-5608-47BE-85EE-563864461915",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.9:*:*:*:*:*:*:*",
"matchCriteriaId": "AF39E62B-EAB4-44B0-A421-2A71B7DD8341",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.10:*:*:*:*:*:*:*",
"matchCriteriaId": "809264F1-763D-4A8F-B206-222332DD8732",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.11:*:*:*:*:*:*:*",
"matchCriteriaId": "A66ED53E-3139-4972-B027-D614BFFB8628",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.12:*:*:*:*:*:*:*",
"matchCriteriaId": "85A3AB7A-1959-4A57-B83D-B2753C43649E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.13:*:*:*:*:*:*:*",
"matchCriteriaId": "B8FB7FA3-727D-4BB9-937C-F4F5DA97FFCA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.14:*:*:*:*:*:*:*",
"matchCriteriaId": "4A60B265-5508-4EE0-980A-44BB0966FD7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*",
"matchCriteriaId": "C06F0037-DE20-4B4A-977F-BFCFAB026517",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D08CBC56-C820-4513-ABEC-1ABB3EFC3A15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18.2:*:*:*:*:*:*:*",
"matchCriteriaId": "338BB401-8831-4094-9186-2B3CFA5903D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18.3:*:*:*:*:*:*:*",
"matchCriteriaId": "1E32E6BA-AFEF-44A8-B230-87DD043BB222",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F69E575B-BD1A-4E50-8D6F-131D5E08058E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18.5:*:*:*:*:*:*:*",
"matchCriteriaId": "20F6269B-5F6B-4413-B14D-7AE5442E4CCD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18.6:*:*:*:*:*:*:*",
"matchCriteriaId": "189D1246-F975-4411-A58B-343ED90485FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18.7:*:*:*:*:*:*:*",
"matchCriteriaId": "1B914F7F-C6BD-4527-B1E9-7FD1E337A18C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18.8:*:*:*:*:*:*:*",
"matchCriteriaId": "82EC9FCA-D17D-4CB9-B925-E8F8B68F8FCE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19:*:*:*:*:*:*:*",
"matchCriteriaId": "179147E4-5247-451D-9409-545D661BC158",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6554469E-F6AE-4EB0-880E-CBFD196FEE31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2F99CFC1-DCCE-47B9-98EF-84AEDAECE02E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C20367B0-F722-4442-8B59-ABB0FEDB8CC8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19.4:*:*:*:*:*:*:*",
"matchCriteriaId": "86A98A70-51E3-4556-8DC4-DD09CF370D1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19.5:*:*:*:*:*:*:*",
"matchCriteriaId": "469EE3B0-3CC2-4AC2-86A0-2DF34205E707",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19.6:*:*:*:*:*:*:*",
"matchCriteriaId": "FCFECB2B-6482-45F2-B3BB-EDDEDA0948A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19.7:*:*:*:*:*:*:*",
"matchCriteriaId": "8EC547EB-9308-4477-8256-A0E04B42D6DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20:*:*:*:*:*:*:*",
"matchCriteriaId": "C6940324-0383-4510-BA55-770E0A6B80B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1E3313D5-52E8-49B3-B145-170D9A26DA43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.2:*:*:*:*:*:*:*",
"matchCriteriaId": "3D3A5FD5-4C42-4B00-8473-D5650FAED9C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.3:*:*:*:*:*:*:*",
"matchCriteriaId": "480F035A-A59D-4113-A246-DF108BB2F591",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.4:*:*:*:*:*:*:*",
"matchCriteriaId": "30D39E29-B2A0-4075-84AF-994C27AB0A68",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.5:*:*:*:*:*:*:*",
"matchCriteriaId": "19879317-B067-45DA-B497-21EBDDDC2521",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.6:*:*:*:*:*:*:*",
"matchCriteriaId": "D220C745-28AD-4D04-B2D2-A090D229206E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.7:*:*:*:*:*:*:*",
"matchCriteriaId": "8BC5B3A6-6CD5-448D-B910-3BAD15FDC3A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.8:*:*:*:*:*:*:*",
"matchCriteriaId": "E4AF8895-7BF8-458E-B2BB-68699AABC023",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.9:*:*:*:*:*:*:*",
"matchCriteriaId": "CA768A9D-6C63-405E-9D14-5D68F8E93A91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.10:*:*:*:*:*:*:*",
"matchCriteriaId": "FF495E58-DA6C-402D-B381-4929CB8A502B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.11:*:*:*:*:*:*:*",
"matchCriteriaId": "AA794BE8-1A22-4BF8-AB79-53E7BCE60D9C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.12:*:*:*:*:*:*:*",
"matchCriteriaId": "A591301C-C30F-44AC-90F0-709A18AA96E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.13:*:*:*:*:*:*:*",
"matchCriteriaId": "F7D2606B-00A6-4FA3-A00D-B1E8A80B947C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.14:*:*:*:*:*:*:*",
"matchCriteriaId": "610A93BB-70E3-4BF1-83E8-8A7388477F44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.15:*:*:*:*:*:*:*",
"matchCriteriaId": "821BD11F-3C6A-4424-BC9B-DFD786248B07",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.16:*:*:*:*:*:*:*",
"matchCriteriaId": "6F55A024-9F8E-44F8-A0D8-696BC232524A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.17:*:*:*:*:*:*:*",
"matchCriteriaId": "84595143-3B04-4CE8-81C0-28EEEC58CD0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.18:*:*:*:*:*:*:*",
"matchCriteriaId": "32EE2B49-DDEB-4B49-A5F0-CAA161095A5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.19:*:*:*:*:*:*:*",
"matchCriteriaId": "C3ABFA33-8FA1-488E-A9BD-1593F495F595",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.20:*:*:*:*:*:*:*",
"matchCriteriaId": "62F6DE3A-E6CC-4D7E-BD08-E43DC4182200",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.21:*:*:*:*:*:*:*",
"matchCriteriaId": "A9A29C44-EBE5-42B0-AFAD-C5A8F6EEF2F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21:*:*:*:*:*:*:*",
"matchCriteriaId": "50B422D1-6C6E-4359-A169-3EED78A1CF40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6AD2E9DC-2876-4515-BCE6-DDD0CC6A5708",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A2F19064-CFBF-4B3C-A0A1-CE62265CD592",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21.3:*:*:*:*:*:*:*",
"matchCriteriaId": "AD3F0CEC-B8FA-47E3-BA3E-182F43D3DA86",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21.4:*:*:*:*:*:*:*",
"matchCriteriaId": "AB759752-DC19-4750-838B-056063EFDC5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21.5:*:*:*:*:*:*:*",
"matchCriteriaId": "96A43C95-8569-40BE-9E5B-F9B3D0B9D188",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21.6:*:*:*:*:*:*:*",
"matchCriteriaId": "ABD70B2B-9827-4DBB-B82D-0B70C2D4AB1F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21.7:*:*:*:*:*:*:*",
"matchCriteriaId": "99662904-E5E3-4E81-B199-39707EAEB652",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22:*:*:*:*:*:*:*",
"matchCriteriaId": "615BDD1D-36AA-4976-909B-F0F66BF1090C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EE8A26D6-1BDA-45F0-8F7C-F95986050E32",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.2:*:*:*:*:*:*:*",
"matchCriteriaId": "61A3EDF2-09D7-4116-AE46-D86E4B9602AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F320FA9F-C13D-4AA3-B838-A0E5D63E6A29",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.4:*:*:*:*:*:*:*",
"matchCriteriaId": "B179CF1D-084D-4B21-956F-E55AC6BDE026",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.5:*:*:*:*:*:*:*",
"matchCriteriaId": "6F1B4877-286A-44B5-9C5C-0403F75B2BAA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.6:*:*:*:*:*:*:*",
"matchCriteriaId": "432CA976-6EFA-4D34-B5EA-CD772D067F93",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.7:*:*:*:*:*:*:*",
"matchCriteriaId": "6E476195-657E-416E-BC16-44A18B06A133",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.8:*:*:*:*:*:*:*",
"matchCriteriaId": "12A55028-B8F9-4AD2-AE57-A80D561F3C79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.9:*:*:*:*:*:*:*",
"matchCriteriaId": "0C4E641C-67D4-4599-8EFB-0B2F8D81D68C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.10:*:*:*:*:*:*:*",
"matchCriteriaId": "70460F6C-D6C0-4C1A-B13E-368705EAF223",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.11:*:*:*:*:*:*:*",
"matchCriteriaId": "3F26BA18-08AD-45FE-9F83-25CCB2E27270",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.12:*:*:*:*:*:*:*",
"matchCriteriaId": "6EBFF148-3EDA-4216-910B-8930D8C443C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.13:*:*:*:*:*:*:*",
"matchCriteriaId": "648C63F7-EA1D-4F2E-B8AF-1F380C83E542",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.14:*:*:*:*:*:*:*",
"matchCriteriaId": "1697B855-4834-4633-A5C8-C1F7F13ACE0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.15:*:*:*:*:*:*:*",
"matchCriteriaId": "1FBAE75F-9145-4B9A-A6D8-E488C5326145",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.16:*:*:*:*:*:*:*",
"matchCriteriaId": "DFF566DA-0F04-48DA-AA40-565979C55328",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.17:*:*:*:*:*:*:*",
"matchCriteriaId": "5990C6C2-2F66-4C4D-8224-74163865F410",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.18:*:*:*:*:*:*:*",
"matchCriteriaId": "3A45A9B9-4B19-4A5B-BC95-BCBC4EF00F12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.19:*:*:*:*:*:*:*",
"matchCriteriaId": "C23AD176-3B99-4593-BCBD-13C1E579A13E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23:*:*:*:*:*:*:*",
"matchCriteriaId": "5C6A3A30-FEA4-40B6-98A9-1840BB4E8CBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5140380C-71BD-464F-AE53-1814C2653056",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B18EC0A7-8616-4039-B98B-E1216E035B05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.3:*:*:*:*:*:*:*",
"matchCriteriaId": "22FB141B-FA2A-435D-8937-83FC0669CB20",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.4:*:*:*:*:*:*:*",
"matchCriteriaId": "C59131C8-F66A-4380-9F6E-3FC14C7C8562",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.5:*:*:*:*:*:*:*",
"matchCriteriaId": "A5421616-4BF5-4269-8996-C3D2BA6AE2A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.6:*:*:*:*:*:*:*",
"matchCriteriaId": "23FC6CE2-8717-4558-A309-A441D322F00E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.7:*:*:*:*:*:*:*",
"matchCriteriaId": "311BE336-7BB2-47C0-AED5-3DEA706C206F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.8:*:*:*:*:*:*:*",
"matchCriteriaId": "CE87D1BC-A72D-42D2-A93C-67A5823BEB14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.9:*:*:*:*:*:*:*",
"matchCriteriaId": "5AAC2E9D-0E82-4866-9046-ADD448418198",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.10:*:*:*:*:*:*:*",
"matchCriteriaId": "760FB32D-9795-4B29-B79A-A32B5E70F7EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.11:*:*:*:*:*:*:*",
"matchCriteriaId": "0DFF67E9-B0C2-48D5-BB3A-CF21D10010FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.12:*:*:*:*:*:*:*",
"matchCriteriaId": "5881A78C-D162-4DE5-8353-2BB1EC1F428B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.13:*:*:*:*:*:*:*",
"matchCriteriaId": "B13D81D2-1A89-4E61-A90C-5E8BB880310B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.14:*:*:*:*:*:*:*",
"matchCriteriaId": "67F2047A-5F17-4B59-9075-41A5DC5C1CD1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.15:*:*:*:*:*:*:*",
"matchCriteriaId": "80F9887E-2466-4C73-A8E1-2117492F9EC9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.16:*:*:*:*:*:*:*",
"matchCriteriaId": "8FDE5B27-2EF0-464E-8F14-5E809D84D389",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.17:*:*:*:*:*:*:*",
"matchCriteriaId": "815B2EE8-136F-44E4-997D-5F93A54775DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.24:*:*:*:*:*:*:*",
"matchCriteriaId": "13673DF5-09B1-40C8-AC54-A447DE8AB01E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.24.1:*:*:*:*:*:*:*",
"matchCriteriaId": "52152F5A-1833-4490-A373-9C547B90B0F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.24.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B64A095E-5E97-445E-B435-F09983CC0E7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.24.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B8035F93-9DEE-4B92-ABAA-4ABE0B71BF41",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.24.4:*:*:*:*:*:*:*",
"matchCriteriaId": "6EE92406-DBF3-463E-8A51-F9679E851FDB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.24.5:*:*:*:*:*:*:*",
"matchCriteriaId": "3C60D19B-ED9B-443C-9D49-002ABD381119",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.24.6:*:*:*:*:*:*:*",
"matchCriteriaId": "264C61EE-64F6-43AD-B54F-7D683C29E64F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.24.7:*:*:*:*:*:*:*",
"matchCriteriaId": "0149408A-30F6-4EDF-8B3B-CBAB884CE758",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25:*:*:*:*:*:*:*",
"matchCriteriaId": "71295664-89EC-4BB3-9F86-B1DDA20FAC5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.1:*:*:*:*:*:*:*",
"matchCriteriaId": "37BE853A-BA6F-4A70-B166-E34441F0B7DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.2:*:*:*:*:*:*:*",
"matchCriteriaId": "85064FDF-4B62-43BF-B36C-F659D739BC22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.3:*:*:*:*:*:*:*",
"matchCriteriaId": "CEADC505-FF44-4D45-8EA6-B23A1C4564D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.4:*:*:*:*:*:*:*",
"matchCriteriaId": "0CE3C807-5C9B-4B71-868B-DF17ECB1514F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.5:*:*:*:*:*:*:*",
"matchCriteriaId": "A6CADAA2-91D2-40C4-90F3-D7F40A3D4CB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.6:*:*:*:*:*:*:*",
"matchCriteriaId": "45B6847C-873B-4BE1-852D-239115E59BA4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.7:*:*:*:*:*:*:*",
"matchCriteriaId": "FF41209E-D27F-4642-A405-90E822A41897",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.8:*:*:*:*:*:*:*",
"matchCriteriaId": "97F59FD9-46E5-4F63-80A0-091AD44D1867",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.9:*:*:*:*:*:*:*",
"matchCriteriaId": "428844A5-E020-4AE9-8012-9AEDFCB7C32E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.10:*:*:*:*:*:*:*",
"matchCriteriaId": "94C9D70D-A552-48D6-9497-EE07EB5649D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.11:*:*:*:*:*:*:*",
"matchCriteriaId": "AF6169FF-9FF9-4A81-BAEB-6D5132F64F61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.12:*:*:*:*:*:*:*",
"matchCriteriaId": "E6DC79CF-A504-4232-9F66-B5DCD0213DA0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.13:*:*:*:*:*:*:*",
"matchCriteriaId": "192B4273-0935-4232-BBFD-A850855CAC5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.14:*:*:*:*:*:*:*",
"matchCriteriaId": "60E9FDA8-7EC3-4B9B-B508-27F948D60DDB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.15:*:*:*:*:*:*:*",
"matchCriteriaId": "E4E4A6E5-0C2C-42FD-B982-684CCB0DDFBB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.26:*:*:*:*:*:*:*",
"matchCriteriaId": "E45F4429-5A9C-4E8B-96EE-CCF19776CABF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.26.2:*:*:*:*:*:*:*",
"matchCriteriaId": "3A74970C-5EEA-47A7-A62D-AF98F4D1228F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Integer overflow in the dccp_setsockopt_change function in net/dccp/proto.c in the Datagram Congestion Control Protocol (DCCP) subsystem in the Linux kernel 2.6.17-rc1 through 2.6.26.2 allows remote attackers to cause a denial of service (panic) via a crafted integer value, related to Change L and Change R options without at least one byte in the dccpsf_val field."
},
{
"lang": "es",
"value": "Desbordamiento de entero en la funci\u00f3n dccp_setsockopt_change de net/dccp/proto.c en el subsistema Datagram Congestion Control Protocol (DCCP (Protocolo de Control de Congesti\u00f3n de Datagramas)) del kernel de Linux de 2.6.17-rc1 a 2.6.26.2 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (p\u00e1nico) mediante un valor de entero manipulado, relacionado con opciones Change L y Change R que no tienen al menos un byte en el campo dccpsf_val."
}
],
"id": "CVE-2008-3276",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2008-08-18T17:41:00.000",
"references": [
{
"source": "secalert@redhat.com",
"url": "http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.26.y.git%3Ba=commit%3Bh=3e8a0a559c66ee9e7468195691a56fefc3589740"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00008.html"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/31509"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/31836"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/31881"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/32190"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/32237"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/32370"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/32393"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/32485"
},
{
"source": "secalert@redhat.com",
"url": "http://www.debian.org/security/2008/dsa-1636"
},
{
"source": "secalert@redhat.com",
"url": "http://www.debian.org/security/2008/dsa-1653"
},
{
"source": "secalert@redhat.com",
"url": "http://www.openwall.com/lists/oss-security/2008/08/15/3"
},
{
"source": "secalert@redhat.com",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0857.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0957.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/bid/30704"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securitytracker.com/id?1020705"
},
{
"source": "secalert@redhat.com",
"url": "http://www.ubuntu.com/usn/usn-659-1"
},
{
"source": "secalert@redhat.com",
"url": "http://www.vupen.com/english/advisories/2008/2406"
},
{
"source": "secalert@redhat.com",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=459226"
},
{
"source": "secalert@redhat.com",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11506"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.26.y.git%3Ba=commit%3Bh=3e8a0a559c66ee9e7468195691a56fefc3589740"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00008.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/31509"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/31836"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/31881"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/32190"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/32237"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/32370"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/32393"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/32485"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2008/dsa-1636"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2008/dsa-1653"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2008/08/15/3"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0857.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0957.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/30704"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1020705"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.ubuntu.com/usn/usn-659-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2008/2406"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=459226"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11506"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-189"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-95VC-9C5J-R2H2
Vulnerability from github – Published: 2022-05-01 23:58 – Updated: 2022-05-01 23:58Integer overflow in the dccp_setsockopt_change function in net/dccp/proto.c in the Datagram Congestion Control Protocol (DCCP) subsystem in the Linux kernel 2.6.17-rc1 through 2.6.26.2 allows remote attackers to cause a denial of service (panic) via a crafted integer value, related to Change L and Change R options without at least one byte in the dccpsf_val field.
{
"affected": [],
"aliases": [
"CVE-2008-3276"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2008-08-18T17:41:00Z",
"severity": "HIGH"
},
"details": "Integer overflow in the dccp_setsockopt_change function in net/dccp/proto.c in the Datagram Congestion Control Protocol (DCCP) subsystem in the Linux kernel 2.6.17-rc1 through 2.6.26.2 allows remote attackers to cause a denial of service (panic) via a crafted integer value, related to Change L and Change R options without at least one byte in the dccpsf_val field.",
"id": "GHSA-95vc-9c5j-r2h2",
"modified": "2022-05-01T23:58:24Z",
"published": "2022-05-01T23:58:24Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3276"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2008:0857"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2008:0957"
},
{
"type": "WEB",
"url": "https://access.redhat.com/security/cve/CVE-2008-3276"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=459226"
},
{
"type": "WEB",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11506"
},
{
"type": "WEB",
"url": "http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.26.y.git%3Ba=commit%3Bh=3e8a0a559c66ee9e7468195691a56fefc3589740"
},
{
"type": "WEB",
"url": "http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.26.y.git;a=commit;h=3e8a0a559c66ee9e7468195691a56fefc3589740"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00008.html"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/31509"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/31836"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/31881"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/32190"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/32237"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/32370"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/32393"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/32485"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2008/dsa-1636"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2008/dsa-1653"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2008/08/15/3"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0857.html"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0957.html"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/30704"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id?1020705"
},
{
"type": "WEB",
"url": "http://www.ubuntu.com/usn/usn-659-1"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2008/2406"
}
],
"schema_version": "1.4.0",
"severity": []
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.