Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2010-3442 (GCVE-0-2010-3442)
Vulnerability from cvelistv5
Published
2010-10-04 20:00
Modified
2024-08-07 03:11
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple integer overflows in the snd_ctl_new function in sound/core/control.c in the Linux kernel before 2.6.36-rc5-next-20100929 allow local users to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a crafted (1) SNDRV_CTL_IOCTL_ELEM_ADD or (2) SNDRV_CTL_IOCTL_ELEM_REPLACE ioctl call.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:11:44.277Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "42789", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42789" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.kernel.org/?p=linux/kernel/git/tiwai/sound-2.6.git%3Ba=commit%3Bh=5591bf07225523600450edd9e6ad258bb877b779" }, { "name": "ADV-2011-0024", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0024" }, { "name": "42778", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42778" }, { "name": "RHSA-2011:0004", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0004.html" }, { "name": "USN-1000-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1000-1" }, { "name": "42801", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42801" }, { "name": "20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded" }, { "name": "46397", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/46397" }, { "name": "SUSE-SA:2011:002", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html" }, { "name": "ADV-2010-3113", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/3113" }, { "name": "FEDORA-2010-18983", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html" }, { "name": "SUSE-SA:2011:001", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html" }, { "name": "[oss-security] 20100929 Re: CVE request - kernel: prevent heap corruption in snd_ctl_new()", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2010/09/29/4" }, { "name": "RHSA-2010:0936", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0936.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.36-rc5-next-20100928.bz2" }, { "name": "SUSE-SA:2011:007", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html" }, { "name": "SUSE-SA:2010:060", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html" }, { "name": "ADV-2010-3321", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/3321" }, { "name": "RHSA-2010:0842", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0842.html" }, { "name": "ADV-2011-0298", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0298" }, { "name": "RHSA-2010:0958", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0958.html" }, { "name": "43787", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/43787" }, { "name": "[oss-security] 20100929 Re: CVE request - kernel: prevent heap corruption in snd_ctl_new()", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2010/09/29/3" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=638478" }, { "name": "MDVSA-2010:257", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:257" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html" }, { "name": "ADV-2011-0375", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0375" }, { "name": "ADV-2011-0012", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0012" }, { "name": "SUSE-SA:2011:008", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html" }, { "name": "[oss-security] 20100929 Re: CVE request - kernel: prevent heap corruption in snd_ctl_new()", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2010/09/29/9" }, { "name": "42745", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42745" }, { "name": "43291", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43291" }, { "name": "[oss-security] 20100929 CVE request - kernel: prevent heap corruption in snd_ctl_new()", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2010/09/29/2" }, { "name": "42400", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42400" }, { "name": "DSA-2126", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2010/dsa-2126" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-09-29T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple integer overflows in the snd_ctl_new function in sound/core/control.c in the Linux kernel before 2.6.36-rc5-next-20100929 allow local users to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a crafted (1) SNDRV_CTL_IOCTL_ELEM_ADD or (2) SNDRV_CTL_IOCTL_ELEM_REPLACE ioctl call." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "42789", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42789" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.kernel.org/?p=linux/kernel/git/tiwai/sound-2.6.git%3Ba=commit%3Bh=5591bf07225523600450edd9e6ad258bb877b779" }, { "name": "ADV-2011-0024", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0024" }, { "name": "42778", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42778" }, { "name": "RHSA-2011:0004", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0004.html" }, { "name": "USN-1000-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1000-1" }, { "name": "42801", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42801" }, { "name": "20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded" }, { "name": "46397", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/46397" }, { "name": "SUSE-SA:2011:002", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html" }, { "name": "ADV-2010-3113", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/3113" }, { "name": "FEDORA-2010-18983", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html" }, { "name": "SUSE-SA:2011:001", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html" }, { "name": "[oss-security] 20100929 Re: CVE request - kernel: prevent heap corruption in snd_ctl_new()", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2010/09/29/4" }, { "name": "RHSA-2010:0936", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0936.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.36-rc5-next-20100928.bz2" }, { "name": "SUSE-SA:2011:007", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html" }, { "name": "SUSE-SA:2010:060", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html" }, { "name": "ADV-2010-3321", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/3321" }, { "name": "RHSA-2010:0842", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0842.html" }, { "name": "ADV-2011-0298", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0298" }, { "name": "RHSA-2010:0958", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0958.html" }, { "name": "43787", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/43787" }, { "name": "[oss-security] 20100929 Re: CVE request - kernel: prevent heap corruption in snd_ctl_new()", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2010/09/29/3" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=638478" }, { "name": "MDVSA-2010:257", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:257" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html" }, { "name": "ADV-2011-0375", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0375" }, { "name": "ADV-2011-0012", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0012" }, { "name": "SUSE-SA:2011:008", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html" }, { "name": "[oss-security] 20100929 Re: CVE request - kernel: prevent heap corruption in snd_ctl_new()", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2010/09/29/9" }, { "name": "42745", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42745" }, { "name": "43291", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43291" }, { "name": "[oss-security] 20100929 CVE request - kernel: prevent heap corruption in snd_ctl_new()", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2010/09/29/2" }, { "name": "42400", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42400" }, { "name": "DSA-2126", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2010/dsa-2126" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2010-3442", "datePublished": "2010-10-04T20:00:00", "dateReserved": "2010-09-17T00:00:00", "dateUpdated": "2024-08-07T03:11:44.277Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2010-3442\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2010-10-04T21:00:04.923\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Multiple integer overflows in the snd_ctl_new function in sound/core/control.c in the Linux kernel before 2.6.36-rc5-next-20100929 allow local users to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a crafted (1) SNDRV_CTL_IOCTL_ELEM_ADD or (2) SNDRV_CTL_IOCTL_ELEM_REPLACE ioctl call.\"},{\"lang\":\"es\",\"value\":\"M\u00faltiples desbordamientos de entero en la funci\u00f3n snd_ctl_new de sound/core/control.c en el kernel de Linux en versiones anteriores a la 2.6.36-rc5-next-20100929. Permiten a usuarios locales provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de la memoria din\u00e1mica) o posiblemente provocar otros impactos sin especificar a trav\u00e9s de una llamada ioctl (1) SNDRV_CTL_IOCTL_ELEM_ADD o (2) SNDRV_CTL_IOCTL_ELEM_REPLACE ioctl call.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:M/Au:N/C:N/I:N/A:C\",\"baseScore\":4.7,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.4,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-190\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.6.36\",\"matchCriteriaId\":\"C8DCE5E2-B055-4F05-8F0F-F19D1B7BA8D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4407EF9-4ECF-408F-9ECB-0705E3FB65D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBE26099-6D2C-4FAF-B15C-CBF985D59171\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2C193FF-3723-4BE9-8787-DED7D455FA8F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"F874FE6A-968D-47E1-900A-E154E41EDAF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"14B7B8AE-CE83-4F0E-9138-6F165D97C19F\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2D59BD0-43DE-4E58-A057-640AB98359A6\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A01C8B7E-EB19-40EA-B1D2-9AE5EA536C95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5646FDE9-CF21-46A9-B89D-F5BBDB4249AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E496249-23A8-42FC-A109-634A54B5600F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"640FB29C-1A84-41E1-86DE-B542EA0EF153\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CD2D897-E321-4CED-92E0-11A98B52053C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*\",\"matchCriteriaId\":\"25CBACD3-AFB7-410D-927F-0C1FF477D396\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DB8A616-865B-4E70-BA2E-BE5F0BA7A351\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C757774-08E7-40AA-B532-6F705C8F7639\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"454A5D17-B171-4F1F-9E0B-F18D1E5CA9FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*\",\"matchCriteriaId\":\"7EBFE35C-E243-43D1-883D-4398D71763CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5D026D0-EF78-438D-BEDD-FC8571F3ACEB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2BCB73E-27BB-4878-AD9C-90C4F20C25A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*\",\"matchCriteriaId\":\"01EDA41C-6B2E-49AF-B503-EB3882265C11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87614B58-24AB-49FB-9C84-E8DDBA16353B\"}]}]}],\"references\":[{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/tiwai/sound-2.6.git%3Ba=commit%3Bh=5591bf07225523600450edd9e6ad258bb877b779\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/42400\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/42745\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/42778\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/42789\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/42801\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/43291\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/46397\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2010/dsa-2126\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.36-rc5-next-20100928.bz2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2010:257\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2010/09/29/2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2010/09/29/3\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2010/09/29/4\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2010/09/29/9\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0842.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0936.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0958.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0004.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/archive/1/520102/100/0/threaded\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/bid/43787\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-1000-1\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2011-0012.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2010/3113\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2010/3321\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0012\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0024\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0298\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0375\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=638478\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/tiwai/sound-2.6.git%3Ba=commit%3Bh=5591bf07225523600450edd9e6ad258bb877b779\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/42400\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/42745\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/42778\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/42789\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/42801\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/43291\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/46397\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2010/dsa-2126\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.36-rc5-next-20100928.bz2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2010:257\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2010/09/29/2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2010/09/29/3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2010/09/29/4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2010/09/29/9\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0842.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0936.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0958.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0004.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/archive/1/520102/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/bid/43787\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-1000-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2011-0012.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2010/3113\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2010/3321\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0012\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0024\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0298\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0375\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=638478\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]}]}}" } }
rhsa-2010:0958
Vulnerability from csaf_redhat
Published
2010-12-08 19:07
Modified
2025-08-06 14:26
Summary
Red Hat Security Advisory: kernel-rt security and bug fix update
Notes
Topic
Updated kernel-rt packages that fix multiple security issues and three bugs
are now available for Red Hat Enterprise MRG 1.3.
The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
Details
The kernel-rt packages contain the Linux kernel, the core of any Linux
operating system.
Security fixes:
* Missing sanity checks in the Intel i915 driver in the Linux kernel could
allow a local, unprivileged user to escalate their privileges.
(CVE-2010-2962, Important)
* A flaw in sctp_packet_config() in the Linux kernel's Stream Control
Transmission Protocol (SCTP) implementation could allow a remote attacker
to cause a denial of service. (CVE-2010-3432, Important)
* A missing integer overflow check in snd_ctl_new() in the Linux kernel's
sound subsystem could allow a local, unprivileged user on a 32-bit system
to cause a denial of service or escalate their privileges. (CVE-2010-3442,
Important)
* A flaw in sctp_auth_asoc_get_hmac() in the Linux kernel's SCTP
implementation. When iterating through the hmac_ids array, it did not reset
the last id element if it was out of range. This could allow a remote
attacker to cause a denial of service. (CVE-2010-3705, Important)
* Missing sanity checks in setup_arg_pages() in the Linux kernel. When
making the size of the argument and environment area on the stack very
large, it could trigger a BUG_ON(), resulting in a local denial of service.
(CVE-2010-3858, Moderate)
* A flaw in ethtool_get_rxnfc() in the Linux kernel's ethtool IOCTL
handler. When it is called with a large info.rule_cnt, it could allow a
local user to cause an information leak. (CVE-2010-3861, Moderate)
* A flaw in bcm_connect() in the Linux kernel's Controller Area Network
(CAN) Broadcast Manager. On 64-bit systems, writing the socket address may
overflow the procname character array. (CVE-2010-3874, Moderate)
* A flaw in inet_csk_diag_dump() in the Linux kernel's module for
monitoring the sockets of INET transport protocols. By sending a netlink
message with certain bytecode, a local, unprivileged user could cause a
denial of service. (CVE-2010-3880, Moderate)
* Missing sanity checks in gdth_ioctl_alloc() in the gdth driver in the
Linux kernel, could allow a local user with access to "/dev/gdth" on a
64-bit system to cause a denial of service or escalate their privileges.
(CVE-2010-4157, Moderate)
* A use-after-free flaw in the mprotect() system call could allow a local,
unprivileged user to cause a local denial of service. (CVE-2010-4169,
Moderate)
* Missing initialization flaws in the Linux kernel could lead to
information leaks. (CVE-2010-3876, CVE-2010-4072, CVE-2010-4073,
CVE-2010-4074, CVE-2010-4075, CVE-2010-4077, CVE-2010-4079, CVE-2010-4080,
CVE-2010-4082, CVE-2010-4083, CVE-2010-4158, Low)
Red Hat would like to thank Kees Cook for reporting CVE-2010-2962,
CVE-2010-3861, and CVE-2010-4072; Dan Rosenberg for reporting
CVE-2010-3442, CVE-2010-3705, CVE-2010-3874, CVE-2010-4073, CVE-2010-4074,
CVE-2010-4075, CVE-2010-4077, CVE-2010-4079, CVE-2010-4080, CVE-2010-4082,
CVE-2010-4083, and CVE-2010-4158; Brad Spengler for reporting
CVE-2010-3858; Nelson Elhage for reporting CVE-2010-3880; and Vasiliy
Kulikov for reporting CVE-2010-3876.
Bug fixes:
* A vulnerability in the 32-bit compatibility code for the VIDIOCSMICROCODE
IOCTL in the Video4Linux implementation. It does not affect Red Hat
Enterprise MRG, but as a preventive measure, this update removes the code.
Red Hat would like to thank Kees Cook for reporting this vulnerability.
(BZ#642469)
* The kernel-rt spec file was missing the crypto, drm, generated, and trace
header directories when generating the kernel-rt-devel package, resulting
in out-of-tree modules failing to build. (BZ#608784)
* On computers without a supported Performance Monitoring Unit, a crash
would occur when running the "perf top" command, and occasionally other
perf commands. perf software events are now marked as IRQ safe to avoid
this crash. (BZ#647434)
Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel-rt packages that fix multiple security issues and three bugs\nare now available for Red Hat Enterprise MRG 1.3.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel-rt packages contain the Linux kernel, the core of any Linux\noperating system.\n\nSecurity fixes:\n\n* Missing sanity checks in the Intel i915 driver in the Linux kernel could\nallow a local, unprivileged user to escalate their privileges.\n(CVE-2010-2962, Important)\n\n* A flaw in sctp_packet_config() in the Linux kernel\u0027s Stream Control\nTransmission Protocol (SCTP) implementation could allow a remote attacker\nto cause a denial of service. (CVE-2010-3432, Important)\n\n* A missing integer overflow check in snd_ctl_new() in the Linux kernel\u0027s\nsound subsystem could allow a local, unprivileged user on a 32-bit system\nto cause a denial of service or escalate their privileges. (CVE-2010-3442,\nImportant)\n\n* A flaw in sctp_auth_asoc_get_hmac() in the Linux kernel\u0027s SCTP\nimplementation. When iterating through the hmac_ids array, it did not reset\nthe last id element if it was out of range. This could allow a remote\nattacker to cause a denial of service. (CVE-2010-3705, Important)\n\n* Missing sanity checks in setup_arg_pages() in the Linux kernel. When\nmaking the size of the argument and environment area on the stack very\nlarge, it could trigger a BUG_ON(), resulting in a local denial of service.\n(CVE-2010-3858, Moderate)\n\n* A flaw in ethtool_get_rxnfc() in the Linux kernel\u0027s ethtool IOCTL\nhandler. When it is called with a large info.rule_cnt, it could allow a\nlocal user to cause an information leak. (CVE-2010-3861, Moderate)\n\n* A flaw in bcm_connect() in the Linux kernel\u0027s Controller Area Network\n(CAN) Broadcast Manager. On 64-bit systems, writing the socket address may\noverflow the procname character array. (CVE-2010-3874, Moderate)\n\n* A flaw in inet_csk_diag_dump() in the Linux kernel\u0027s module for\nmonitoring the sockets of INET transport protocols. By sending a netlink\nmessage with certain bytecode, a local, unprivileged user could cause a\ndenial of service. (CVE-2010-3880, Moderate)\n\n* Missing sanity checks in gdth_ioctl_alloc() in the gdth driver in the\nLinux kernel, could allow a local user with access to \"/dev/gdth\" on a\n64-bit system to cause a denial of service or escalate their privileges.\n(CVE-2010-4157, Moderate)\n\n* A use-after-free flaw in the mprotect() system call could allow a local,\nunprivileged user to cause a local denial of service. (CVE-2010-4169,\nModerate)\n\n* Missing initialization flaws in the Linux kernel could lead to\ninformation leaks. (CVE-2010-3876, CVE-2010-4072, CVE-2010-4073,\nCVE-2010-4074, CVE-2010-4075, CVE-2010-4077, CVE-2010-4079, CVE-2010-4080,\nCVE-2010-4082, CVE-2010-4083, CVE-2010-4158, Low)\n\nRed Hat would like to thank Kees Cook for reporting CVE-2010-2962,\nCVE-2010-3861, and CVE-2010-4072; Dan Rosenberg for reporting\nCVE-2010-3442, CVE-2010-3705, CVE-2010-3874, CVE-2010-4073, CVE-2010-4074,\nCVE-2010-4075, CVE-2010-4077, CVE-2010-4079, CVE-2010-4080, CVE-2010-4082,\nCVE-2010-4083, and CVE-2010-4158; Brad Spengler for reporting\nCVE-2010-3858; Nelson Elhage for reporting CVE-2010-3880; and Vasiliy\nKulikov for reporting CVE-2010-3876.\n\nBug fixes:\n\n* A vulnerability in the 32-bit compatibility code for the VIDIOCSMICROCODE\nIOCTL in the Video4Linux implementation. It does not affect Red Hat\nEnterprise MRG, but as a preventive measure, this update removes the code.\nRed Hat would like to thank Kees Cook for reporting this vulnerability.\n(BZ#642469)\n\n* The kernel-rt spec file was missing the crypto, drm, generated, and trace\nheader directories when generating the kernel-rt-devel package, resulting\nin out-of-tree modules failing to build. (BZ#608784)\n\n* On computers without a supported Performance Monitoring Unit, a crash\nwould occur when running the \"perf top\" command, and occasionally other\nperf commands. perf software events are now marked as IRQ safe to avoid\nthis crash. (BZ#647434)\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2010:0958", "url": "https://access.redhat.com/errata/RHSA-2010:0958" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "608784", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=608784" }, { "category": "external", "summary": "637675", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=637675" }, { "category": "external", "summary": "637688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=637688" }, { "category": "external", "summary": "638478", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=638478" }, { "category": "external", "summary": "640036", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640036" }, { "category": "external", "summary": "642469", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=642469" }, { "category": "external", "summary": "645222", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=645222" }, { "category": "external", "summary": "646725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=646725" }, { "category": "external", "summary": "647434", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=647434" }, { "category": "external", "summary": "648656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=648656" }, { "category": "external", "summary": "648658", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=648658" }, { "category": "external", "summary": "648659", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=648659" }, { "category": "external", "summary": "648660", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=648660" }, { "category": "external", "summary": "648663", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=648663" }, { "category": "external", "summary": "648666", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=648666" }, { "category": "external", "summary": "648669", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=648669" }, { "category": "external", "summary": "648671", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=648671" }, { "category": "external", "summary": "648673", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=648673" }, { "category": "external", "summary": "649695", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=649695" }, { "category": "external", "summary": "649715", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=649715" }, { "category": "external", "summary": "651147", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=651147" }, { "category": "external", "summary": "651264", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=651264" }, { "category": "external", "summary": "651671", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=651671" }, { "category": "external", "summary": "651698", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=651698" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0958.json" } ], "title": "Red Hat Security Advisory: kernel-rt security and bug fix update", "tracking": { "current_release_date": "2025-08-06T14:26:28+00:00", "generator": { "date": "2025-08-06T14:26:28+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2010:0958", "initial_release_date": "2010-12-08T19:07:00+00:00", "revision_history": [ { "date": "2010-12-08T19:07:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2010-12-08T14:08:55+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-06T14:26:28+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "MRG Realtime for RHEL 5 Server", "product": { "name": "MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_mrg:1::el5" } } } ], "category": "product_family", "name": "Red Hat Enterprise MRG for RHEL-5" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "product": { "name": "kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "product_id": "kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla@2.6.33.7-rt29.47.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "product": { "name": "kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "product_id": "kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@2.6.33.7-rt29.47.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "product": { "name": "kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "product_id": "kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace@2.6.33.7-rt29.47.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "product": { "name": "kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "product_id": "kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@2.6.33.7-rt29.47.el5rt?arch=i686" } } }, { "category": "product_version", "name": "perf-0:2.6.33.7-rt29.47.el5rt.i686", "product": { "name": "perf-0:2.6.33.7-rt29.47.el5rt.i686", "product_id": "perf-0:2.6.33.7-rt29.47.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.33.7-rt29.47.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "product": { "name": "kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "product_id": "kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@2.6.33.7-rt29.47.el5rt?arch=i686" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "product": { "name": "perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "product_id": "perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.33.7-rt29.47.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "product": { "name": "kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "product_id": "kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@2.6.33.7-rt29.47.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "product": { "name": "kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "product_id": "kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@2.6.33.7-rt29.47.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "product": { "name": "kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "product_id": "kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@2.6.33.7-rt29.47.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "product": { "name": "kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "product_id": "kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@2.6.33.7-rt29.47.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "product": { "name": "kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "product_id": "kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@2.6.33.7-rt29.47.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "product": { "name": "kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "product_id": "kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common@2.6.33.7-rt29.47.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "product": { "name": "kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "product_id": "kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@2.6.33.7-rt29.47.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "product": { "name": "kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "product_id": "kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@2.6.33.7-rt29.47.el5rt?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "product": { "name": "kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "product_id": "kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla@2.6.33.7-rt29.47.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "product": { "name": "kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "product_id": "kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@2.6.33.7-rt29.47.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "product": { "name": "kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "product_id": "kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace@2.6.33.7-rt29.47.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "product": { "name": "kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "product_id": "kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@2.6.33.7-rt29.47.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "product": { "name": "perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "product_id": "perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.33.7-rt29.47.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "product": { "name": "kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "product_id": "kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@2.6.33.7-rt29.47.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "product": { "name": "perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "product_id": "perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.33.7-rt29.47.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "product": { "name": "kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "product_id": "kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@2.6.33.7-rt29.47.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "product": { "name": "kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "product_id": "kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@2.6.33.7-rt29.47.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "product": { "name": "kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "product_id": "kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@2.6.33.7-rt29.47.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "product": { "name": "kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "product_id": "kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@2.6.33.7-rt29.47.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "product": { "name": "kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "product_id": "kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@2.6.33.7-rt29.47.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "product": { "name": "kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "product_id": "kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common@2.6.33.7-rt29.47.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "product": { "name": "kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "product_id": "kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@2.6.33.7-rt29.47.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "product": { "name": "kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "product_id": "kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@2.6.33.7-rt29.47.el5rt?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "product": { "name": "kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "product_id": "kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-doc@2.6.33.7-rt29.47.el5rt?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "product": { "name": "kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "product_id": "kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@2.6.33.7-rt29.47.el5rt?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686" }, "product_reference": "kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:2.6.33.7-rt29.47.el5rt.src as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src" }, "product_reference": "kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64" }, "product_reference": "kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686" }, "product_reference": "kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64" }, "product_reference": "kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686" }, "product_reference": "kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686" }, "product_reference": "kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686" }, "product_reference": "kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686" }, "product_reference": "kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686" }, "product_reference": "kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64" }, "product_reference": "kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch" }, "product_reference": "kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686" }, "product_reference": "kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64" }, "product_reference": "kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686" }, "product_reference": "kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" }, "product_reference": "kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686" }, "product_reference": "kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64" }, "product_reference": "kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686" }, "product_reference": "kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64" }, "product_reference": "kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686" }, "product_reference": "kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" }, "product_reference": "kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686" }, "product_reference": "kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64" }, "product_reference": "kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.33.7-rt29.47.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686" }, "product_reference": "perf-0:2.6.33.7-rt29.47.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.33.7-rt29.47.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64" }, "product_reference": "perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686" }, "product_reference": "perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Kees Cook" ] } ], "cve": "CVE-2010-2962", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2010-09-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "637688" } ], "notes": [ { "category": "description", "text": "drivers/gpu/drm/i915/i915_gem.c in the Graphics Execution Manager (GEM) in the Intel i915 driver in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 2.6.36 does not properly validate pointers to blocks of memory, which allows local users to write to arbitrary kernel memory locations, and consequently gain privileges, via crafted use of the ioctl interface, related to (1) pwrite and (2) pread operations.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: arbitrary kernel memory write via i915 GEM ioctl", "title": "Vulnerability summary" }, { "category": "other", "text": "The Linux kernel as shipped with Red Hat Enterprise Linux 3, 4, 5, and Red Hat Enterprise MRG did not include support for Graphics Execution Manager (GEM) in the i915 driver, and therefore are not affected by this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-2962" }, { "category": "external", "summary": "RHBZ#637688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=637688" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-2962", "url": "https://www.cve.org/CVERecord?id=CVE-2010-2962" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-2962", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2962" } ], "release_date": "2010-10-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-12-08T19:07:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0958" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: arbitrary kernel memory write via i915 GEM ioctl" }, { "cve": "CVE-2010-3432", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2010-09-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "637675" } ], "notes": [ { "category": "description", "text": "The sctp_packet_config function in net/sctp/output.c in the Linux kernel before 2.6.35.6 performs extraneous initializations of packet data structures, which allows remote attackers to cause a denial of service (panic) via a certain sequence of SCTP traffic.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: sctp: do not reset the packet during sctp_packet_config", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the version of Linux kernel as shipped with Red Hat Enterprise Linux 3 as it did not include support for SCTP. This was addressed in Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2010-0958.html and https://rhn.redhat.com/errata/RHSA-2010-0842.html. Future updates in Red Hat Enterprise Linux 4 and 5 may address this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3432" }, { "category": "external", "summary": "RHBZ#637675", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=637675" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3432", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3432" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3432", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3432" } ], "release_date": "2010-09-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-12-08T19:07:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0958" }, { "category": "workaround", "details": "For users that do not run applications that use SCTP, you can prevent the sctp module from being loaded by adding the following entry to the end of the /etc/modprobe.d/blacklist file:\n\nblacklist sctp\n\nThis way, the sctp module cannot be loaded accidentally, which may occur if an application that requires SCTP is started. A reboot is not necessary for this change to take effect.", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: sctp: do not reset the packet during sctp_packet_config" }, { "acknowledgments": [ { "names": [ "Dan Rosenberg" ] } ], "cve": "CVE-2010-3442", "discovery_date": "2010-09-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "638478" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in the snd_ctl_new function in sound/core/control.c in the Linux kernel before 2.6.36-rc5-next-20100929 allow local users to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a crafted (1) SNDRV_CTL_IOCTL_ELEM_ADD or (2) SNDRV_CTL_IOCTL_ELEM_REPLACE ioctl call.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: prevent heap corruption in snd_ctl_new()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3442" }, { "category": "external", "summary": "RHBZ#638478", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=638478" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3442", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3442" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3442", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3442" } ], "release_date": "2010-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-12-08T19:07:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0958" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: prevent heap corruption in snd_ctl_new()" }, { "acknowledgments": [ { "names": [ "Dan Rosenberg" ] } ], "cve": "CVE-2010-3705", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2010-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "640036" } ], "notes": [ { "category": "description", "text": "The sctp_auth_asoc_get_hmac function in net/sctp/auth.c in the Linux kernel before 2.6.36 does not properly validate the hmac_ids array of an SCTP peer, which allows remote attackers to cause a denial of service (memory corruption and panic) via a crafted value in the last element of this array.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: sctp memory corruption in HMAC handling", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is aware of this issue and is tracking it via the following bug:\nhttps://bugzilla.redhat.com/CVE-2010-3705.\n\nThis issue did not affect the version of Linux kernel as shipped with Red Hat Enterprise Linux 3 as it did not include support for SCTP. It did not affect Red Hat Enterprise Linux 4 and 5 as it did not include upstream commit 1f485649 that introduced the problem. Future kernel updates in Red Hat Enterprise MRG may address this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3705" }, { "category": "external", "summary": "RHBZ#640036", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640036" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3705", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3705" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3705", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3705" } ], "release_date": "2010-10-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-12-08T19:07:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0958" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 8.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: sctp memory corruption in HMAC handling" }, { "acknowledgments": [ { "names": [ "Brad Spengler" ] } ], "cve": "CVE-2010-3858", "discovery_date": "2010-08-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "645222" } ], "notes": [ { "category": "description", "text": "The setup_arg_pages function in fs/exec.c in the Linux kernel before 2.6.36, when CONFIG_STACK_GROWSDOWN is used, does not properly restrict the stack memory consumption of the (1) arguments and (2) environment for a 32-bit application on a 64-bit platform, which allows local users to cause a denial of service (system crash) via a crafted exec system call, a related issue to CVE-2010-2240.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: setup_arg_pages: diagnose excessive argument size", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat\nEnterprise Linux 4 as they did not backport the upstream commit b6a2fea3 that introduced the issue. This was addressed in Red Hat Enterprise Linux 5 and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-0004.html and \nhttps://rhn.redhat.com/errata/RHSA-2010-0958.html. Future kernel updates in Red Hat Enterprise Linux 6 may address this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3858" }, { "category": "external", "summary": "RHBZ#645222", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=645222" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3858", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3858" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3858", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3858" } ], "release_date": "2010-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-12-08T19:07:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0958" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: setup_arg_pages: diagnose excessive argument size" }, { "acknowledgments": [ { "names": [ "Kees Cook" ] } ], "cve": "CVE-2010-3861", "discovery_date": "2010-10-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "646725" } ], "notes": [ { "category": "description", "text": "The ethtool_get_rxnfc function in net/core/ethtool.c in the Linux kernel before 2.6.36 does not initialize a certain block of heap memory, which allows local users to obtain potentially sensitive information via an ETHTOOL_GRXCLSRLALL ethtool command with a large info.rule_cnt value, a different vulnerability than CVE-2010-2478.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: heap contents leak from ETHTOOL_GRXCLSRLALL", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat\nEnterprise Linux 3 and 4, as they do not include support for the Neptune\nEthernet driver. It did not affect Red Hat Enterprise Linux 5 as it did not contain the upstream commit 0853ad66 that introduced this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3861" }, { "category": "external", "summary": "RHBZ#646725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=646725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3861", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3861" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3861", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3861" } ], "release_date": "2010-10-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-12-08T19:07:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0958" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: heap contents leak from ETHTOOL_GRXCLSRLALL" }, { "acknowledgments": [ { "names": [ "Dan Rosenberg" ] } ], "cve": "CVE-2010-3874", "discovery_date": "2010-11-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "649695" } ], "notes": [ { "category": "description", "text": "Heap-based buffer overflow in the bcm_connect function in net/can/bcm.c (aka the Broadcast Manager) in the Controller Area Network (CAN) implementation in the Linux kernel before 2.6.36.2 on 64-bit platforms might allow local users to cause a denial of service (memory corruption) via a connect operation.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: CAN minor heap overflow", "title": "Vulnerability summary" }, { "category": "other", "text": "The Linux kernel as shipped with Red Hat Enterprise Linux 3, 4 and 5 did not include CAN bus subsystem support, and therefore are not affected by this issue. Future kernel updates in Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG may address this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3874" }, { "category": "external", "summary": "RHBZ#649695", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=649695" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3874", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3874" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3874", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3874" } ], "release_date": "2010-11-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-12-08T19:07:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0958" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: CAN minor heap overflow" }, { "acknowledgments": [ { "names": [ "Vasiliy Kulikov" ], "organization": "Openwall" } ], "cve": "CVE-2010-3876", "discovery_date": "2010-11-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "649715" } ], "notes": [ { "category": "description", "text": "net/packet/af_packet.c in the Linux kernel before 2.6.37-rc2 does not properly initialize certain structure members, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_RAW capability to read copies of the applicable structures.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: net/packet/af_packet.c: reading uninitialized stack memory", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is not planned to be fixed in Red Hat Enterprise Linux 3, due to\nthis product being in Extended Life Cycle Phase of its maintenance life-cycle,\nwhere only qualified security errata of critical impact are addressed.\n\nFor further information about the Errata Support Policy, visit:\nhttp://www.redhat.com/security/updates/errata", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3876" }, { "category": "external", "summary": "RHBZ#649715", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=649715" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3876", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3876" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3876", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3876" } ], "release_date": "2010-10-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-12-08T19:07:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0958" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: net/packet/af_packet.c: reading uninitialized stack memory" }, { "acknowledgments": [ { "names": [ "Nelson Elhage" ] } ], "cve": "CVE-2010-3880", "discovery_date": "2010-11-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "651264" } ], "notes": [ { "category": "description", "text": "net/ipv4/inet_diag.c in the Linux kernel before 2.6.37-rc2 does not properly audit INET_DIAG bytecode, which allows local users to cause a denial of service (kernel infinite loop) via crafted INET_DIAG_REQ_BYTECODE instructions in a netlink message that contains multiple attribute elements, as demonstrated by INET_DIAG_BC_JMP instructions.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: logic error in INET_DIAG bytecode auditing", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the version of Linux kernel as shipped with Red Hat Enterprise Linux 4 as it did not include support for monitoring of INET transport protocol sockets. Future updates in Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG may address this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3880" }, { "category": "external", "summary": "RHBZ#651264", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=651264" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3880", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3880" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3880", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3880" } ], "release_date": "2010-11-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-12-08T19:07:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0958" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: logic error in INET_DIAG bytecode auditing" }, { "acknowledgments": [ { "names": [ "Vasiliy Kulikov" ], "organization": "Openwall" }, { "names": [ "Kees Cook" ] } ], "cve": "CVE-2010-4072", "discovery_date": "2010-10-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "648656" } ], "notes": [ { "category": "description", "text": "The copy_shmid_to_user function in ipc/shm.c in the Linux kernel before 2.6.37-rc1 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via vectors related to the shmctl system call and the \"old shm interface.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: ipc/shm.c: reading uninitialized stack memory", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is not planned to be fixed in Red Hat Enterprise Linux 3, due to this product being in Extended Life Cycle Phase of its maintenance life-cycle, where only qualified security errata of critical impact are addressed.\n \nFor further information about the Errata Support Policy, visit:\nhttp://www.redhat.com/security/updates/errata", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4072" }, { "category": "external", "summary": "RHBZ#648656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=648656" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4072", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4072" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4072", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4072" } ], "release_date": "2010-10-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-12-08T19:07:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0958" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: ipc/shm.c: reading uninitialized stack memory" }, { "acknowledgments": [ { "names": [ "Dan Rosenberg" ] } ], "cve": "CVE-2010-4073", "discovery_date": "2010-10-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "648658" } ], "notes": [ { "category": "description", "text": "The ipc subsystem in the Linux kernel before 2.6.37-rc1 does not initialize certain structures, which allows local users to obtain potentially sensitive information from kernel stack memory via vectors related to the (1) compat_sys_semctl, (2) compat_sys_msgctl, and (3) compat_sys_shmctl functions in ipc/compat.c; and the (4) compat_sys_mq_open and (5) compat_sys_mq_getsetattr functions in ipc/compat_mq.c.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: ipc/compat*.c: reading uninitialized stack memory", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the version of Linux kernel as shipped with Red Hat\nEnterprise Linux 3 as it did not include IPC compat functionality.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4073" }, { "category": "external", "summary": "RHBZ#648658", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=648658" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4073", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4073" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4073", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4073" } ], "release_date": "2010-10-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-12-08T19:07:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0958" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: ipc/compat*.c: reading uninitialized stack memory" }, { "acknowledgments": [ { "names": [ "Dan Rosenberg" ] } ], "cve": "CVE-2010-4074", "discovery_date": "2010-10-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "648659" } ], "notes": [ { "category": "description", "text": "The USB subsystem in the Linux kernel before 2.6.36-rc5 does not properly initialize certain structure members, which allows local users to obtain potentially sensitive information from kernel stack memory via vectors related to TIOCGICOUNT ioctl calls, and the (1) mos7720_ioctl function in drivers/usb/serial/mos7720.c and (2) mos7840_ioctl function in drivers/usb/serial/mos7840.c.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: drivers/usb/serial/mos*.c: reading uninitialized stack memory", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat\nEnterprise Linux 3, 4, and 5 as they did not include support for Moschip USB\nserial port adapters.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4074" }, { "category": "external", "summary": "RHBZ#648659", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=648659" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4074", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4074" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4074", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4074" } ], "release_date": "2010-09-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-12-08T19:07:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0958" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: drivers/usb/serial/mos*.c: reading uninitialized stack memory" }, { "acknowledgments": [ { "names": [ "Dan Rosenberg" ] } ], "cve": "CVE-2010-4075", "discovery_date": "2010-10-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "648660" } ], "notes": [ { "category": "description", "text": "The uart_get_count function in drivers/serial/serial_core.c in the Linux kernel before 2.6.37-rc1 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: drivers/serial/serial_core.c: reading uninitialized stack memory", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the version of Linux kernel as shipped with Red Hat\nEnterprise Linux 3 as it did not include the affected functionality.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4075" }, { "category": "external", "summary": "RHBZ#648660", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=648660" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4075", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4075" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4075", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4075" } ], "release_date": "2010-09-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-12-08T19:07:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0958" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: drivers/serial/serial_core.c: reading uninitialized stack memory" }, { "acknowledgments": [ { "names": [ "Dan Rosenberg" ] } ], "cve": "CVE-2010-4077", "discovery_date": "2010-10-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "648663" } ], "notes": [ { "category": "description", "text": "The ntty_ioctl_tiocgicount function in drivers/char/nozomi.c in the Linux kernel 2.6.36.1 and earlier does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: drivers/char/nozomi.c: reading uninitialized stack memory", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat\nEnterprise Linux 3, 4, and 5 as they did not include support for GlobeTrotter\nHSPDA PCMCIA card.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4077" }, { "category": "external", "summary": "RHBZ#648663", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=648663" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4077", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4077" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4077", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4077" } ], "release_date": "2010-09-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-12-08T19:07:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0958" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: drivers/char/nozomi.c: reading uninitialized stack memory" }, { "acknowledgments": [ { "names": [ "Dan Rosenberg" ] } ], "cve": "CVE-2010-4079", "discovery_date": "2010-10-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "648666" } ], "notes": [ { "category": "description", "text": "The ivtvfb_ioctl function in drivers/media/video/ivtv/ivtvfb.c in the Linux kernel before 2.6.36-rc8 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via an FBIOGET_VBLANK ioctl call.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: drivers/video/ivtv/ivtvfb.c: reading uninitialized stack memory", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat\nEnterprise Linux 3, 4, and 5 as they did not include support for the Conexant\u0027s\nCX23415/CX23416 codec chip.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4079" }, { "category": "external", "summary": "RHBZ#648666", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=648666" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4079", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4079" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4079", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4079" } ], "release_date": "2010-09-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-12-08T19:07:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0958" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: drivers/video/ivtv/ivtvfb.c: reading uninitialized stack memory" }, { "acknowledgments": [ { "names": [ "Dan Rosenberg" ] } ], "cve": "CVE-2010-4080", "discovery_date": "2010-10-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "648669" } ], "notes": [ { "category": "description", "text": "The snd_hdsp_hwdep_ioctl function in sound/pci/rme9652/hdsp.c in the Linux kernel before 2.6.36-rc6 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via an SNDRV_HDSP_IOCTL_GET_CONFIG_INFO ioctl call.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: drivers/sound/pci/rme9652/hdsp.c: reading uninitialized stack memory", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the version of Linux kernel as shipped with Red Hat Enterprise Linux 3 as it did not include support for RME Hammerfall DSP Audio.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4080" }, { "category": "external", "summary": "RHBZ#648669", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=648669" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4080", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4080" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4080", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4080" } ], "release_date": "2010-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-12-08T19:07:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0958" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: drivers/sound/pci/rme9652/hdsp.c: reading uninitialized stack memory" }, { "acknowledgments": [ { "names": [ "Dan Rosenberg" ] } ], "cve": "CVE-2010-4082", "discovery_date": "2010-10-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "648671" } ], "notes": [ { "category": "description", "text": "The viafb_ioctl_get_viafb_info function in drivers/video/via/ioctl.c in the Linux kernel before 2.6.36-rc5 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a VIAFB_GET_INFO ioctl call.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: drivers/video/via/ioctl.c: reading uninitialized stack memory", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 3, 4, and 5 as they did not include support for VIA UniChrome (Pro) and Chrome9 graphics boards.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4082" }, { "category": "external", "summary": "RHBZ#648671", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=648671" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4082", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4082" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4082", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4082" } ], "release_date": "2010-09-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-12-08T19:07:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0958" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: drivers/video/via/ioctl.c: reading uninitialized stack memory" }, { "acknowledgments": [ { "names": [ "Dan Rosenberg" ] } ], "cve": "CVE-2010-4083", "discovery_date": "2010-10-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "648673" } ], "notes": [ { "category": "description", "text": "The copy_semid_to_user function in ipc/sem.c in the Linux kernel before 2.6.36 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via a (1) IPC_INFO, (2) SEM_INFO, (3) IPC_STAT, or (4) SEM_STAT command in a semctl system call.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: ipc/sem.c: reading uninitialized stack memory", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is not planned to be fixed in Red Hat Enterprise Linux 3,\ndue to this product being in Extended Life Cycle Phase of its\nmaintenance life-cycle, where only qualified security errata of critical\nimpact are addressed.\n\nFor further information about the Errata Support Policy, visit:\nhttp://www.redhat.com/security/updates/errata", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4083" }, { "category": "external", "summary": "RHBZ#648673", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=648673" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4083", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4083" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4083", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4083" } ], "release_date": "2010-09-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-12-08T19:07:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0958" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: ipc/sem.c: reading uninitialized stack memory" }, { "cve": "CVE-2010-4157", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2010-11-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "651147" } ], "notes": [ { "category": "description", "text": "Integer overflow in the ioc_general function in drivers/scsi/gdth.c in the Linux kernel before 2.6.36.1 on 64-bit platforms allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact via a large argument in an ioctl call.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: gdth: integer overflow in ioc_general()", "title": "Vulnerability summary" }, { "category": "other", "text": "The Linux kernel as shipped with Red Hat Enterprise Linux 3 did not include the vulnerable code, and therefore is not affected by this issue. Future kernel updates in Red Hat Enterprise Linux 4, 5 and Red Hat Enterprise MRG may address this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4157" }, { "category": "external", "summary": "RHBZ#651147", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=651147" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4157", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4157" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4157", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4157" } ], "release_date": "2010-11-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-12-08T19:07:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0958" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 6.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:H/Au:S/C:C/I:C/A:C", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: gdth: integer overflow in ioc_general()" }, { "acknowledgments": [ { "names": [ "Dan Rosenberg" ] } ], "cve": "CVE-2010-4158", "discovery_date": "2010-11-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "651698" } ], "notes": [ { "category": "description", "text": "The sk_run_filter function in net/core/filter.c in the Linux kernel before 2.6.36.2 does not check whether a certain memory location has been initialized before executing a (1) BPF_S_LD_MEM or (2) BPF_S_LDX_MEM instruction, which allows local users to obtain potentially sensitive information from kernel stack memory via a crafted socket filter.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: socket filters infoleak", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4158" }, { "category": "external", "summary": "RHBZ#651698", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=651698" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4158", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4158" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4158", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4158" } ], "release_date": "2010-11-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-12-08T19:07:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0958" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: socket filters infoleak" }, { "cve": "CVE-2010-4169", "discovery_date": "2010-11-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "651671" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in mm/mprotect.c in the Linux kernel before 2.6.37-rc2 allows local users to cause a denial of service via vectors involving an mprotect system call.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: perf bug", "title": "Vulnerability summary" }, { "category": "other", "text": "The Linux kernel as shipped with Red Hat Enterprise Linux 3, 4 and 5 did not backport the upstream commit dab5855 that introduced the issue. Future kernel updates in Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG may address this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4169" }, { "category": "external", "summary": "RHBZ#651671", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=651671" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4169", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4169" } ], "release_date": "2010-11-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-12-08T19:07:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0958" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.7, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: perf bug" } ] }
rhsa-2011:0004
Vulnerability from csaf_redhat
Published
2011-01-04 16:49
Modified
2025-08-06 14:26
Summary
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
Notes
Topic
Updated kernel packages that fix multiple security issues, several bugs,
and add an enhancement are now available for Red Hat Enterprise Linux 5.
The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux
operating system.
This update fixes the following security issues:
* A flaw was found in sctp_packet_config() in the Linux kernel's Stream
Control Transmission Protocol (SCTP) implementation. A remote attacker
could use this flaw to cause a denial of service. (CVE-2010-3432,
Important)
* A missing integer overflow check was found in snd_ctl_new() in the Linux
kernel's sound subsystem. A local, unprivileged user on a 32-bit system
could use this flaw to cause a denial of service or escalate their
privileges. (CVE-2010-3442, Important)
* A heap overflow flaw in the Linux kernel's Transparent Inter-Process
Communication protocol (TIPC) implementation could allow a local,
unprivileged user to escalate their privileges. (CVE-2010-3859, Important)
* An integer overflow flaw was found in the Linux kernel's Reliable
Datagram Sockets (RDS) protocol implementation. A local, unprivileged user
could use this flaw to cause a denial of service or escalate their
privileges. (CVE-2010-3865, Important)
* A flaw was found in the Xenbus code for the unified block-device I/O
interface back end. A privileged guest user could use this flaw to cause a
denial of service on the host system running the Xen hypervisor.
(CVE-2010-3699, Moderate)
* Missing sanity checks were found in setup_arg_pages() in the Linux
kernel. When making the size of the argument and environment area on the
stack very large, it could trigger a BUG_ON(), resulting in a local denial
of service. (CVE-2010-3858, Moderate)
* A flaw was found in inet_csk_diag_dump() in the Linux kernel's module for
monitoring the sockets of INET transport protocols. By sending a netlink
message with certain bytecode, a local, unprivileged user could cause a
denial of service. (CVE-2010-3880, Moderate)
* Missing sanity checks were found in gdth_ioctl_alloc() in the gdth driver
in the Linux kernel. A local user with access to "/dev/gdth" on a 64-bit
system could use this flaw to cause a denial of service or escalate their
privileges. (CVE-2010-4157, Moderate)
* The fix for Red Hat Bugzilla bug 484590 as provided in RHSA-2009:1243
introduced a regression. A local, unprivileged user could use this flaw to
cause a denial of service. (CVE-2010-4161, Moderate)
* A NULL pointer dereference flaw was found in the Bluetooth HCI UART
driver in the Linux kernel. A local, unprivileged user could use this flaw
to cause a denial of service. (CVE-2010-4242, Moderate)
* It was found that a malicious guest running on the Xen hypervisor could
place invalid data in the memory that the guest shared with the blkback and
blktap back-end drivers, resulting in a denial of service on the host
system. (CVE-2010-4247, Moderate)
* A flaw was found in the Linux kernel's CPU time clocks implementation for
the POSIX clock interface. A local, unprivileged user could use this flaw
to cause a denial of service. (CVE-2010-4248, Moderate)
* Missing initialization flaws in the Linux kernel could lead to
information leaks. (CVE-2010-3876, CVE-2010-4083, Low)
Red Hat would like to thank Dan Rosenberg for reporting CVE-2010-3442,
CVE-2010-4161, and CVE-2010-4083; Thomas Pollet for reporting
CVE-2010-3865; Brad Spengler for reporting CVE-2010-3858; Nelson Elhage for
reporting CVE-2010-3880; Alan Cox for reporting CVE-2010-4242; and Vasiliy
Kulikov for reporting CVE-2010-3876.
This update also fixes several bugs and adds an enhancement. Documentation
for the bug fixes and the enhancement will be available shortly from the
Technical Notes document, linked to in the References section.
Users should upgrade to these updated packages, which contain backported
patches to correct these issues, and fix the bugs and add the enhancement
noted in the Technical Notes. The system must be rebooted for this update
to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages that fix multiple security issues, several bugs,\nand add an enhancement are now available for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues:\n\n* A flaw was found in sctp_packet_config() in the Linux kernel\u0027s Stream\nControl Transmission Protocol (SCTP) implementation. A remote attacker\ncould use this flaw to cause a denial of service. (CVE-2010-3432,\nImportant)\n\n* A missing integer overflow check was found in snd_ctl_new() in the Linux\nkernel\u0027s sound subsystem. A local, unprivileged user on a 32-bit system\ncould use this flaw to cause a denial of service or escalate their\nprivileges. (CVE-2010-3442, Important)\n\n* A heap overflow flaw in the Linux kernel\u0027s Transparent Inter-Process\nCommunication protocol (TIPC) implementation could allow a local,\nunprivileged user to escalate their privileges. (CVE-2010-3859, Important)\n\n* An integer overflow flaw was found in the Linux kernel\u0027s Reliable\nDatagram Sockets (RDS) protocol implementation. A local, unprivileged user\ncould use this flaw to cause a denial of service or escalate their\nprivileges. (CVE-2010-3865, Important)\n\n* A flaw was found in the Xenbus code for the unified block-device I/O\ninterface back end. A privileged guest user could use this flaw to cause a\ndenial of service on the host system running the Xen hypervisor.\n(CVE-2010-3699, Moderate)\n\n* Missing sanity checks were found in setup_arg_pages() in the Linux\nkernel. When making the size of the argument and environment area on the\nstack very large, it could trigger a BUG_ON(), resulting in a local denial\nof service. (CVE-2010-3858, Moderate)\n\n* A flaw was found in inet_csk_diag_dump() in the Linux kernel\u0027s module for\nmonitoring the sockets of INET transport protocols. By sending a netlink\nmessage with certain bytecode, a local, unprivileged user could cause a\ndenial of service. (CVE-2010-3880, Moderate)\n\n* Missing sanity checks were found in gdth_ioctl_alloc() in the gdth driver\nin the Linux kernel. A local user with access to \"/dev/gdth\" on a 64-bit\nsystem could use this flaw to cause a denial of service or escalate their\nprivileges. (CVE-2010-4157, Moderate)\n\n* The fix for Red Hat Bugzilla bug 484590 as provided in RHSA-2009:1243\nintroduced a regression. A local, unprivileged user could use this flaw to\ncause a denial of service. (CVE-2010-4161, Moderate)\n\n* A NULL pointer dereference flaw was found in the Bluetooth HCI UART\ndriver in the Linux kernel. A local, unprivileged user could use this flaw\nto cause a denial of service. (CVE-2010-4242, Moderate)\n\n* It was found that a malicious guest running on the Xen hypervisor could\nplace invalid data in the memory that the guest shared with the blkback and\nblktap back-end drivers, resulting in a denial of service on the host\nsystem. (CVE-2010-4247, Moderate)\n\n* A flaw was found in the Linux kernel\u0027s CPU time clocks implementation for\nthe POSIX clock interface. A local, unprivileged user could use this flaw\nto cause a denial of service. (CVE-2010-4248, Moderate)\n\n* Missing initialization flaws in the Linux kernel could lead to\ninformation leaks. (CVE-2010-3876, CVE-2010-4083, Low)\n\nRed Hat would like to thank Dan Rosenberg for reporting CVE-2010-3442,\nCVE-2010-4161, and CVE-2010-4083; Thomas Pollet for reporting\nCVE-2010-3865; Brad Spengler for reporting CVE-2010-3858; Nelson Elhage for\nreporting CVE-2010-3880; Alan Cox for reporting CVE-2010-4242; and Vasiliy\nKulikov for reporting CVE-2010-3876.\n\nThis update also fixes several bugs and adds an enhancement. Documentation\nfor the bug fixes and the enhancement will be available shortly from the\nTechnical Notes document, linked to in the References section.\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues, and fix the bugs and add the enhancement\nnoted in the Technical Notes. The system must be rebooted for this update\nto take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2011:0004", "url": "https://access.redhat.com/errata/RHSA-2011:0004" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5/html/5.5_Technical_Notes/kernel.html#RHSA-2011-0004", "url": "http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5/html/5.5_Technical_Notes/kernel.html#RHSA-2011-0004" }, { "category": "external", "summary": "636411", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=636411" }, { "category": "external", "summary": "637675", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=637675" }, { "category": "external", "summary": "638478", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=638478" }, { "category": "external", "summary": "641410", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=641410" }, { "category": "external", "summary": "643339", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=643339" }, { "category": "external", "summary": "643344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=643344" }, { "category": "external", "summary": "643345", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=643345" }, { "category": "external", "summary": "643347", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=643347" }, { "category": "external", "summary": "645222", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=645222" }, { "category": "external", "summary": "645867", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=645867" }, { "category": "external", "summary": "646765", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=646765" }, { "category": "external", "summary": "647416", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=647416" }, { "category": "external", "summary": "647681", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=647681" }, { "category": "external", "summary": "648673", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=648673" }, { "category": "external", "summary": "648938", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=648938" }, { "category": "external", "summary": "649255", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=649255" }, { "category": "external", "summary": "649715", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=649715" }, { "category": "external", "summary": "651147", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=651147" }, { "category": "external", "summary": "651264", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=651264" }, { "category": "external", "summary": "651805", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=651805" }, { "category": "external", "summary": "651811", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=651811" }, { "category": "external", "summary": "651818", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=651818" }, { "category": "external", "summary": "652534", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=652534" }, { "category": "external", "summary": "652561", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=652561" }, { "category": "external", "summary": "653335", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=653335" }, { "category": "external", "summary": "656206", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=656206" }, { "category": "external", "summary": "656264", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=656264" }, { "category": "external", "summary": "657028", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=657028" }, { "category": "external", "summary": "657029", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=657029" }, { "category": "external", "summary": "657319", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=657319" }, { "category": "external", "summary": "658079", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=658079" }, { "category": "external", "summary": "658378", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=658378" }, { "category": "external", "summary": "658379", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=658379" }, { "category": "external", "summary": "658520", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=658520" }, { "category": "external", "summary": "658857", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=658857" }, { "category": "external", "summary": "658864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=658864" }, { "category": "external", "summary": "658934", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=658934" }, { "category": "external", "summary": "663353", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=663353" }, { "category": "external", "summary": "663381", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=663381" }, { "category": "external", "summary": "664416", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=664416" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0004.json" } ], "title": "Red Hat Security Advisory: kernel security, bug fix, and enhancement update", "tracking": { "current_release_date": "2025-08-06T14:26:35+00:00", "generator": { "date": "2025-08-06T14:26:35+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2011:0004", "initial_release_date": "2011-01-04T16:49:00+00:00", "revision_history": [ { "date": "2011-01-04T16:49:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2011-01-04T11:52:05+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-06T14:26:35+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "product": { "name": "kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "product_id": "kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-194.32.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "product": { "name": "kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "product_id": "kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-194.32.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-194.32.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "product_id": "kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-194.32.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "product": { "name": "kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "product_id": "kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-194.32.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "product_id": "kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-194.32.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "product_id": "kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-194.32.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "product": { "name": "kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "product_id": "kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-194.32.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64", "product": { "name": "kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64", "product_id": "kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-194.32.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "product_id": "kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-194.32.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-194.32.1.el5.x86_64", "product": { "name": "kernel-0:2.6.18-194.32.1.el5.x86_64", "product_id": "kernel-0:2.6.18-194.32.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-194.32.1.el5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-194.32.1.el5.i386", "product": { "name": "kernel-headers-0:2.6.18-194.32.1.el5.i386", "product_id": "kernel-headers-0:2.6.18-194.32.1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-194.32.1.el5?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.18-194.32.1.el5.i686", "product": { "name": "kernel-devel-0:2.6.18-194.32.1.el5.i686", "product_id": "kernel-devel-0:2.6.18-194.32.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-194.32.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "product_id": "kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-194.32.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "product": { "name": "kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "product_id": "kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-194.32.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-194.32.1.el5.i686", "product": { "name": "kernel-debug-0:2.6.18-194.32.1.el5.i686", "product_id": "kernel-debug-0:2.6.18-194.32.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-194.32.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "product": { "name": "kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "product_id": "kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-194.32.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "product": { "name": "kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "product_id": "kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-194.32.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-0:2.6.18-194.32.1.el5.i686", "product": { "name": "kernel-PAE-0:2.6.18-194.32.1.el5.i686", "product_id": "kernel-PAE-0:2.6.18-194.32.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-194.32.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "product_id": "kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-194.32.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-194.32.1.el5.i686", "product": { "name": "kernel-xen-0:2.6.18-194.32.1.el5.i686", "product_id": "kernel-xen-0:2.6.18-194.32.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-194.32.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "product": { "name": "kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "product_id": "kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-194.32.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "product": { "name": "kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "product_id": "kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-194.32.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "product": { "name": "kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "product_id": "kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-194.32.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-194.32.1.el5.i686", "product": { "name": "kernel-0:2.6.18-194.32.1.el5.i686", "product_id": "kernel-0:2.6.18-194.32.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-194.32.1.el5?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.18-194.32.1.el5.noarch", "product": { "name": "kernel-doc-0:2.6.18-194.32.1.el5.noarch", "product_id": "kernel-doc-0:2.6.18-194.32.1.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.18-194.32.1.el5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.18-194.32.1.el5.src", "product": { "name": "kernel-0:2.6.18-194.32.1.el5.src", "product_id": "kernel-0:2.6.18-194.32.1.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-194.32.1.el5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "product": { "name": "kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "product_id": "kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-194.32.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "product": { "name": "kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "product_id": "kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-194.32.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "product": { "name": "kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "product_id": "kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-194.32.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "product": { "name": "kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "product_id": "kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-194.32.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "product": { "name": "kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "product_id": "kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-194.32.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "product_id": "kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-194.32.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "product_id": "kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-194.32.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "product": { "name": "kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "product_id": "kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-194.32.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "product_id": "kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-194.32.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "product": { "name": "kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "product_id": "kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-194.32.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-194.32.1.el5.ppc64", "product": { "name": "kernel-0:2.6.18-194.32.1.el5.ppc64", "product_id": "kernel-0:2.6.18-194.32.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-194.32.1.el5?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-194.32.1.el5.ppc", "product": { "name": "kernel-headers-0:2.6.18-194.32.1.el5.ppc", "product_id": "kernel-headers-0:2.6.18-194.32.1.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-194.32.1.el5?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "product": { "name": "kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "product_id": "kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-194.32.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "product": { "name": "kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "product_id": "kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-194.32.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-194.32.1.el5.s390x", "product": { "name": "kernel-headers-0:2.6.18-194.32.1.el5.s390x", "product_id": "kernel-headers-0:2.6.18-194.32.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-194.32.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "product": { "name": "kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "product_id": "kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-194.32.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-194.32.1.el5.s390x", "product": { "name": "kernel-devel-0:2.6.18-194.32.1.el5.s390x", "product_id": "kernel-devel-0:2.6.18-194.32.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-194.32.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "product_id": "kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-194.32.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "product": { "name": "kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "product_id": "kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-194.32.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-194.32.1.el5.s390x", "product": { "name": "kernel-debug-0:2.6.18-194.32.1.el5.s390x", "product_id": "kernel-debug-0:2.6.18-194.32.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-194.32.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "product": { "name": "kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "product_id": "kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-194.32.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "product": { "name": "kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "product_id": "kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-194.32.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-194.32.1.el5.s390x", "product": { "name": "kernel-0:2.6.18-194.32.1.el5.s390x", "product_id": "kernel-0:2.6.18-194.32.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-194.32.1.el5?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-194.32.1.el5.ia64", "product": { "name": "kernel-headers-0:2.6.18-194.32.1.el5.ia64", "product_id": "kernel-headers-0:2.6.18-194.32.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-194.32.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-194.32.1.el5.ia64", "product": { "name": "kernel-devel-0:2.6.18-194.32.1.el5.ia64", "product_id": "kernel-devel-0:2.6.18-194.32.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-194.32.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "product_id": "kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-194.32.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "product": { "name": "kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "product_id": "kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-194.32.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-194.32.1.el5.ia64", "product": { "name": "kernel-debug-0:2.6.18-194.32.1.el5.ia64", "product_id": "kernel-debug-0:2.6.18-194.32.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-194.32.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "product_id": "kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-194.32.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "product_id": "kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-194.32.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-194.32.1.el5.ia64", "product": { "name": "kernel-xen-0:2.6.18-194.32.1.el5.ia64", "product_id": "kernel-xen-0:2.6.18-194.32.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-194.32.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "product": { "name": "kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "product_id": "kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-194.32.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "product": { "name": "kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "product_id": "kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-194.32.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-194.32.1.el5.ia64", "product": { "name": "kernel-0:2.6.18-194.32.1.el5.ia64", "product_id": "kernel-0:2.6.18-194.32.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-194.32.1.el5?arch=ia64" } } } ], "category": "architecture", "name": "ia64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-194.32.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-194.32.1.el5.i686" }, "product_reference": "kernel-0:2.6.18-194.32.1.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-194.32.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-194.32.1.el5.ia64" }, "product_reference": "kernel-0:2.6.18-194.32.1.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-194.32.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-194.32.1.el5.ppc64" }, "product_reference": "kernel-0:2.6.18-194.32.1.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-194.32.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-194.32.1.el5.s390x" }, "product_reference": "kernel-0:2.6.18-194.32.1.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-194.32.1.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-194.32.1.el5.src" }, "product_reference": "kernel-0:2.6.18-194.32.1.el5.src", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-194.32.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-194.32.1.el5.x86_64" }, "product_reference": "kernel-0:2.6.18-194.32.1.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-0:2.6.18-194.32.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-PAE-0:2.6.18-194.32.1.el5.i686" }, "product_reference": "kernel-PAE-0:2.6.18-194.32.1.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686" }, "product_reference": "kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686" }, "product_reference": "kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-194.32.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-194.32.1.el5.i686" }, "product_reference": "kernel-debug-0:2.6.18-194.32.1.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-194.32.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ia64" }, "product_reference": "kernel-debug-0:2.6.18-194.32.1.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-194.32.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ppc64" }, "product_reference": "kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-194.32.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-194.32.1.el5.s390x" }, "product_reference": "kernel-debug-0:2.6.18-194.32.1.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-194.32.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-194.32.1.el5.x86_64" }, "product_reference": "kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-194.32.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686" }, "product_reference": "kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64" }, "product_reference": "kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-194.32.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686" }, "product_reference": "kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-194.32.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-194.32.1.el5.i686" }, "product_reference": "kernel-devel-0:2.6.18-194.32.1.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-194.32.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ia64" }, "product_reference": "kernel-devel-0:2.6.18-194.32.1.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-194.32.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ppc64" }, "product_reference": "kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-194.32.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-194.32.1.el5.s390x" }, "product_reference": "kernel-devel-0:2.6.18-194.32.1.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-194.32.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-194.32.1.el5.x86_64" }, "product_reference": "kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.18-194.32.1.el5.noarch as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-doc-0:2.6.18-194.32.1.el5.noarch" }, "product_reference": "kernel-doc-0:2.6.18-194.32.1.el5.noarch", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-194.32.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-194.32.1.el5.i386" }, "product_reference": "kernel-headers-0:2.6.18-194.32.1.el5.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-194.32.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ia64" }, "product_reference": "kernel-headers-0:2.6.18-194.32.1.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-194.32.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc" }, "product_reference": "kernel-headers-0:2.6.18-194.32.1.el5.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-194.32.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc64" }, "product_reference": "kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-194.32.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-194.32.1.el5.s390x" }, "product_reference": "kernel-headers-0:2.6.18-194.32.1.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-194.32.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-194.32.1.el5.x86_64" }, "product_reference": "kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-194.32.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64" }, "product_reference": "kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-194.32.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.s390x" }, "product_reference": "kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64" }, "product_reference": "kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-194.32.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-0:2.6.18-194.32.1.el5.i686" }, "product_reference": "kernel-xen-0:2.6.18-194.32.1.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-194.32.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-0:2.6.18-194.32.1.el5.ia64" }, "product_reference": "kernel-xen-0:2.6.18-194.32.1.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-194.32.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-0:2.6.18-194.32.1.el5.x86_64" }, "product_reference": "kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-194.32.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686" }, "product_reference": "kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64" }, "product_reference": "kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64" }, "product_reference": "kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-194.32.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-194.32.1.el5.i686" }, "product_reference": "kernel-0:2.6.18-194.32.1.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-194.32.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-194.32.1.el5.ia64" }, "product_reference": "kernel-0:2.6.18-194.32.1.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-194.32.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-194.32.1.el5.ppc64" }, "product_reference": "kernel-0:2.6.18-194.32.1.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-194.32.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-194.32.1.el5.s390x" }, "product_reference": "kernel-0:2.6.18-194.32.1.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-194.32.1.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-194.32.1.el5.src" }, "product_reference": "kernel-0:2.6.18-194.32.1.el5.src", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-194.32.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-194.32.1.el5.x86_64" }, "product_reference": "kernel-0:2.6.18-194.32.1.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-0:2.6.18-194.32.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-PAE-0:2.6.18-194.32.1.el5.i686" }, "product_reference": "kernel-PAE-0:2.6.18-194.32.1.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686" }, "product_reference": "kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686" }, "product_reference": "kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-194.32.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-194.32.1.el5.i686" }, "product_reference": "kernel-debug-0:2.6.18-194.32.1.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-194.32.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ia64" }, "product_reference": "kernel-debug-0:2.6.18-194.32.1.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-194.32.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ppc64" }, "product_reference": "kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-194.32.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-194.32.1.el5.s390x" }, "product_reference": "kernel-debug-0:2.6.18-194.32.1.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-194.32.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-194.32.1.el5.x86_64" }, "product_reference": "kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-194.32.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686" }, "product_reference": "kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64" }, "product_reference": "kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-194.32.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686" }, "product_reference": "kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-194.32.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-194.32.1.el5.i686" }, "product_reference": "kernel-devel-0:2.6.18-194.32.1.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-194.32.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ia64" }, "product_reference": "kernel-devel-0:2.6.18-194.32.1.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-194.32.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ppc64" }, "product_reference": "kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-194.32.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-194.32.1.el5.s390x" }, "product_reference": "kernel-devel-0:2.6.18-194.32.1.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-194.32.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-194.32.1.el5.x86_64" }, "product_reference": "kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.18-194.32.1.el5.noarch as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-doc-0:2.6.18-194.32.1.el5.noarch" }, "product_reference": "kernel-doc-0:2.6.18-194.32.1.el5.noarch", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-194.32.1.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-194.32.1.el5.i386" }, "product_reference": "kernel-headers-0:2.6.18-194.32.1.el5.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-194.32.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ia64" }, "product_reference": "kernel-headers-0:2.6.18-194.32.1.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-194.32.1.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc" }, "product_reference": "kernel-headers-0:2.6.18-194.32.1.el5.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-194.32.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc64" }, "product_reference": "kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-194.32.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-194.32.1.el5.s390x" }, "product_reference": "kernel-headers-0:2.6.18-194.32.1.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-194.32.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-194.32.1.el5.x86_64" }, "product_reference": "kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-194.32.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64" }, "product_reference": "kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-194.32.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.s390x" }, "product_reference": "kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64" }, "product_reference": "kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-194.32.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-0:2.6.18-194.32.1.el5.i686" }, "product_reference": "kernel-xen-0:2.6.18-194.32.1.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-194.32.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-0:2.6.18-194.32.1.el5.ia64" }, "product_reference": "kernel-xen-0:2.6.18-194.32.1.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-194.32.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-0:2.6.18-194.32.1.el5.x86_64" }, "product_reference": "kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-194.32.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686" }, "product_reference": "kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64" }, "product_reference": "kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64" }, "product_reference": "kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64", "relates_to_product_reference": "5Server" } ] }, "vulnerabilities": [ { "cve": "CVE-2010-3432", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2010-09-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "637675" } ], "notes": [ { "category": "description", "text": "The sctp_packet_config function in net/sctp/output.c in the Linux kernel before 2.6.35.6 performs extraneous initializations of packet data structures, which allows remote attackers to cause a denial of service (panic) via a certain sequence of SCTP traffic.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: sctp: do not reset the packet during sctp_packet_config", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the version of Linux kernel as shipped with Red Hat Enterprise Linux 3 as it did not include support for SCTP. This was addressed in Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2010-0958.html and https://rhn.redhat.com/errata/RHSA-2010-0842.html. Future updates in Red Hat Enterprise Linux 4 and 5 may address this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-0:2.6.18-194.32.1.el5.src", "5Client:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-0:2.6.18-194.32.1.el5.src", "5Server:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3432" }, { "category": "external", "summary": "RHBZ#637675", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=637675" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3432", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3432" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3432", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3432" } ], "release_date": "2010-09-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-01-04T16:49:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Client:kernel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-0:2.6.18-194.32.1.el5.src", "5Client:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-0:2.6.18-194.32.1.el5.src", "5Server:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2011:0004" }, { "category": "workaround", "details": "For users that do not run applications that use SCTP, you can prevent the sctp module from being loaded by adding the following entry to the end of the /etc/modprobe.d/blacklist file:\n\nblacklist sctp\n\nThis way, the sctp module cannot be loaded accidentally, which may occur if an application that requires SCTP is started. A reboot is not necessary for this change to take effect.", "product_ids": [ "5Client:kernel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-0:2.6.18-194.32.1.el5.src", "5Client:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-0:2.6.18-194.32.1.el5.src", "5Server:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64" ] } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-0:2.6.18-194.32.1.el5.src", "5Client:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-0:2.6.18-194.32.1.el5.src", "5Server:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: sctp: do not reset the packet during sctp_packet_config" }, { "acknowledgments": [ { "names": [ "Dan Rosenberg" ] } ], "cve": "CVE-2010-3442", "discovery_date": "2010-09-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "638478" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in the snd_ctl_new function in sound/core/control.c in the Linux kernel before 2.6.36-rc5-next-20100929 allow local users to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a crafted (1) SNDRV_CTL_IOCTL_ELEM_ADD or (2) SNDRV_CTL_IOCTL_ELEM_REPLACE ioctl call.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: prevent heap corruption in snd_ctl_new()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-0:2.6.18-194.32.1.el5.src", "5Client:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-0:2.6.18-194.32.1.el5.src", "5Server:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3442" }, { "category": "external", "summary": "RHBZ#638478", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=638478" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3442", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3442" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3442", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3442" } ], "release_date": "2010-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-01-04T16:49:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Client:kernel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-0:2.6.18-194.32.1.el5.src", "5Client:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-0:2.6.18-194.32.1.el5.src", "5Server:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2011:0004" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-0:2.6.18-194.32.1.el5.src", "5Client:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-0:2.6.18-194.32.1.el5.src", "5Server:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: prevent heap corruption in snd_ctl_new()" }, { "cve": "CVE-2010-3699", "discovery_date": "2010-09-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "636411" } ], "notes": [ { "category": "description", "text": "The backend driver in Xen 3.x allows guest OS users to cause a denial of service via a kernel thread leak, which prevents the device and guest OS from being shut down or create a zombie domain, causes a hang in zenwatch, or prevents unspecified xm commands from working properly, related to (1) netback, (2) blkback, or (3) blktap.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: guest-\u003ehost denial of service from invalid xenbus transitions", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-0:2.6.18-194.32.1.el5.src", "5Client:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-0:2.6.18-194.32.1.el5.src", "5Server:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3699" }, { "category": "external", "summary": "RHBZ#636411", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=636411" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3699", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3699" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3699", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3699" } ], "release_date": "2010-11-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-01-04T16:49:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Client:kernel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-0:2.6.18-194.32.1.el5.src", "5Client:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-0:2.6.18-194.32.1.el5.src", "5Server:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2011:0004" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 2.7, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-0:2.6.18-194.32.1.el5.src", "5Client:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-0:2.6.18-194.32.1.el5.src", "5Server:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: guest-\u003ehost denial of service from invalid xenbus transitions" }, { "acknowledgments": [ { "names": [ "Brad Spengler" ] } ], "cve": "CVE-2010-3858", "discovery_date": "2010-08-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "645222" } ], "notes": [ { "category": "description", "text": "The setup_arg_pages function in fs/exec.c in the Linux kernel before 2.6.36, when CONFIG_STACK_GROWSDOWN is used, does not properly restrict the stack memory consumption of the (1) arguments and (2) environment for a 32-bit application on a 64-bit platform, which allows local users to cause a denial of service (system crash) via a crafted exec system call, a related issue to CVE-2010-2240.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: setup_arg_pages: diagnose excessive argument size", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat\nEnterprise Linux 4 as they did not backport the upstream commit b6a2fea3 that introduced the issue. This was addressed in Red Hat Enterprise Linux 5 and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-0004.html and \nhttps://rhn.redhat.com/errata/RHSA-2010-0958.html. Future kernel updates in Red Hat Enterprise Linux 6 may address this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-0:2.6.18-194.32.1.el5.src", "5Client:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-0:2.6.18-194.32.1.el5.src", "5Server:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3858" }, { "category": "external", "summary": "RHBZ#645222", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=645222" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3858", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3858" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3858", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3858" } ], "release_date": "2010-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-01-04T16:49:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Client:kernel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-0:2.6.18-194.32.1.el5.src", "5Client:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-0:2.6.18-194.32.1.el5.src", "5Server:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2011:0004" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-0:2.6.18-194.32.1.el5.src", "5Client:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-0:2.6.18-194.32.1.el5.src", "5Server:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: setup_arg_pages: diagnose excessive argument size" }, { "cve": "CVE-2010-3859", "discovery_date": "2010-10-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "645867" } ], "notes": [ { "category": "description", "text": "Multiple integer signedness errors in the TIPC implementation in the Linux kernel before 2.6.36.2 allow local users to gain privileges via a crafted sendmsg call that triggers a heap-based buffer overflow, related to the tipc_msg_build function in net/tipc/msg.c and the verify_iovec function in net/core/iovec.c.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: tipc: heap overflow in tipc_msg_build()", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/CVE-2010-3859.\n\nThis issue did not affect the version of Linux kernel as shipped with Red Hat Enterprise Linux 3, 4, 6 and Red Hat Enterprise MRG as they did not include support for Transparent Inter-Process Communication Protocol (TIPC). A future kernel update in Red Hat Enterprise Linux 5 may address this flaw. As a\npreventive measure, we plan to include the fixes in a future kernel update in Red Hat Enterprise Linux 4.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-0:2.6.18-194.32.1.el5.src", "5Client:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-0:2.6.18-194.32.1.el5.src", "5Server:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3859" }, { "category": "external", "summary": "RHBZ#645867", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=645867" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3859", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3859" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3859", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3859" } ], "release_date": "2010-10-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-01-04T16:49:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Client:kernel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-0:2.6.18-194.32.1.el5.src", "5Client:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-0:2.6.18-194.32.1.el5.src", "5Server:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2011:0004" }, { "category": "workaround", "details": "For users that do not run applications that use TIPC, you can prevent the TIPC\nmodule from being loaded by adding the following entry to the end of the\n/etc/modprobe.d/blacklist file:\n\nblacklist tipc\n\nThis way, the TIPC module cannot be loaded accidentally, which may occur if an\napplication that requires TIPC is started. A reboot is not necessary for this\nchange to take effect but do make sure the module is not loaded in the first\nplace. You can verify that by running:\n\nlsmod | grep tipc\n\nYou may also consider removing the CAP_SYS_MODULE capability from the current\nglobal capability set to prevent kernel modules from being loaded or unloaded.\nThe CAP_SYS_MODULE has a capability number of 16 (see linux/capability.h). The\ndefault value has all the bits set. To remove this capability, you have to\nclear the 16th bit of the default 32-bit value, e.g. 0xffffff ^ (1 \u003c\u003c 16):\n\necho 0xFFFEFFFF \u003e /proc/sys/kernel/cap-bound", "product_ids": [ "5Client:kernel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-0:2.6.18-194.32.1.el5.src", "5Client:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-0:2.6.18-194.32.1.el5.src", "5Server:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64" ] } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-0:2.6.18-194.32.1.el5.src", "5Client:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-0:2.6.18-194.32.1.el5.src", "5Server:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: tipc: heap overflow in tipc_msg_build()" }, { "acknowledgments": [ { "names": [ "Thomas Pollet" ] } ], "cve": "CVE-2010-3865", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2010-10-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "647416" } ], "notes": [ { "category": "description", "text": "Integer overflow in the rds_rdma_pages function in net/rds/rdma.c in the Linux kernel allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a crafted iovec struct in a Reliable Datagram Sockets (RDS) request, which triggers a buffer overflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: iovec integer overflow in net/rds/rdma.c", "title": "Vulnerability summary" }, { "category": "other", "text": "The Linux kernel as shipped with Red Hat Enterprise Linux 3, 4 and Red Hat\nEnterprise MRG did not include support for the RDS Protocol, and therefore are\nnot affected by this issue. Future kernel updates in Red Hat Enterprise Linux 5\nmay address this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-0:2.6.18-194.32.1.el5.src", "5Client:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-0:2.6.18-194.32.1.el5.src", "5Server:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3865" }, { "category": "external", "summary": "RHBZ#647416", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=647416" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3865", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3865" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3865", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3865" } ], "release_date": "2010-10-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-01-04T16:49:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Client:kernel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-0:2.6.18-194.32.1.el5.src", "5Client:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-0:2.6.18-194.32.1.el5.src", "5Server:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2011:0004" }, { "category": "workaround", "details": "For users that do not run applications that use RDS, you can prevent the rds\nmodule from being loaded by adding the following entry to the end of the\n/etc/modprobe.d/blacklist file:\n\nblacklist rds\n\nThis way, the rds module cannot be loaded accidentally, which may occur if an\napplication that requires RDS is started. A reboot is not necessary for this\nchange to take effect but do make sure the module is not loaded in the first\nplace. You can verify that by running:\n\nlsmod | grep rds\n\nYou may also consider removing the CAP_SYS_MODULE capability from the current\nglobal capability set to prevent kernel modules from being loaded or unloaded.\nThe CAP_SYS_MODULE has a capability number of 16 (see linux/capability.h). The\ndefault value has all the bits set. To remove this capability, you have to\nclear the 16th bit of the default 32-bit value, e.g. 0xffffff ^ (1 \u003c\u003c 16):\n\necho 0xFFFEFFFF \u003e /proc/sys/kernel/cap-bound", "product_ids": [ "5Client:kernel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-0:2.6.18-194.32.1.el5.src", "5Client:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-0:2.6.18-194.32.1.el5.src", "5Server:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64" ] } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-0:2.6.18-194.32.1.el5.src", "5Client:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-0:2.6.18-194.32.1.el5.src", "5Server:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: iovec integer overflow in net/rds/rdma.c" }, { "acknowledgments": [ { "names": [ "Vasiliy Kulikov" ], "organization": "Openwall" } ], "cve": "CVE-2010-3876", "discovery_date": "2010-11-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "649715" } ], "notes": [ { "category": "description", "text": "net/packet/af_packet.c in the Linux kernel before 2.6.37-rc2 does not properly initialize certain structure members, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_RAW capability to read copies of the applicable structures.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: net/packet/af_packet.c: reading uninitialized stack memory", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is not planned to be fixed in Red Hat Enterprise Linux 3, due to\nthis product being in Extended Life Cycle Phase of its maintenance life-cycle,\nwhere only qualified security errata of critical impact are addressed.\n\nFor further information about the Errata Support Policy, visit:\nhttp://www.redhat.com/security/updates/errata", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-0:2.6.18-194.32.1.el5.src", "5Client:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-0:2.6.18-194.32.1.el5.src", "5Server:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3876" }, { "category": "external", "summary": "RHBZ#649715", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=649715" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3876", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3876" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3876", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3876" } ], "release_date": "2010-10-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-01-04T16:49:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Client:kernel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-0:2.6.18-194.32.1.el5.src", "5Client:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-0:2.6.18-194.32.1.el5.src", "5Server:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2011:0004" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-0:2.6.18-194.32.1.el5.src", "5Client:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-0:2.6.18-194.32.1.el5.src", "5Server:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: net/packet/af_packet.c: reading uninitialized stack memory" }, { "acknowledgments": [ { "names": [ "Nelson Elhage" ] } ], "cve": "CVE-2010-3880", "discovery_date": "2010-11-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "651264" } ], "notes": [ { "category": "description", "text": "net/ipv4/inet_diag.c in the Linux kernel before 2.6.37-rc2 does not properly audit INET_DIAG bytecode, which allows local users to cause a denial of service (kernel infinite loop) via crafted INET_DIAG_REQ_BYTECODE instructions in a netlink message that contains multiple attribute elements, as demonstrated by INET_DIAG_BC_JMP instructions.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: logic error in INET_DIAG bytecode auditing", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the version of Linux kernel as shipped with Red Hat Enterprise Linux 4 as it did not include support for monitoring of INET transport protocol sockets. Future updates in Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG may address this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-0:2.6.18-194.32.1.el5.src", "5Client:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-0:2.6.18-194.32.1.el5.src", "5Server:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3880" }, { "category": "external", "summary": "RHBZ#651264", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=651264" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3880", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3880" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3880", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3880" } ], "release_date": "2010-11-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-01-04T16:49:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Client:kernel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-0:2.6.18-194.32.1.el5.src", "5Client:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-0:2.6.18-194.32.1.el5.src", "5Server:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2011:0004" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-0:2.6.18-194.32.1.el5.src", "5Client:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-0:2.6.18-194.32.1.el5.src", "5Server:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: logic error in INET_DIAG bytecode auditing" }, { "acknowledgments": [ { "names": [ "Dan Rosenberg" ] } ], "cve": "CVE-2010-4083", "discovery_date": "2010-10-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "648673" } ], "notes": [ { "category": "description", "text": "The copy_semid_to_user function in ipc/sem.c in the Linux kernel before 2.6.36 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via a (1) IPC_INFO, (2) SEM_INFO, (3) IPC_STAT, or (4) SEM_STAT command in a semctl system call.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: ipc/sem.c: reading uninitialized stack memory", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is not planned to be fixed in Red Hat Enterprise Linux 3,\ndue to this product being in Extended Life Cycle Phase of its\nmaintenance life-cycle, where only qualified security errata of critical\nimpact are addressed.\n\nFor further information about the Errata Support Policy, visit:\nhttp://www.redhat.com/security/updates/errata", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-0:2.6.18-194.32.1.el5.src", "5Client:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-0:2.6.18-194.32.1.el5.src", "5Server:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4083" }, { "category": "external", "summary": "RHBZ#648673", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=648673" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4083", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4083" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4083", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4083" } ], "release_date": "2010-09-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-01-04T16:49:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Client:kernel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-0:2.6.18-194.32.1.el5.src", "5Client:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-0:2.6.18-194.32.1.el5.src", "5Server:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2011:0004" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-0:2.6.18-194.32.1.el5.src", "5Client:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-0:2.6.18-194.32.1.el5.src", "5Server:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: ipc/sem.c: reading uninitialized stack memory" }, { "cve": "CVE-2010-4157", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2010-11-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "651147" } ], "notes": [ { "category": "description", "text": "Integer overflow in the ioc_general function in drivers/scsi/gdth.c in the Linux kernel before 2.6.36.1 on 64-bit platforms allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact via a large argument in an ioctl call.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: gdth: integer overflow in ioc_general()", "title": "Vulnerability summary" }, { "category": "other", "text": "The Linux kernel as shipped with Red Hat Enterprise Linux 3 did not include the vulnerable code, and therefore is not affected by this issue. Future kernel updates in Red Hat Enterprise Linux 4, 5 and Red Hat Enterprise MRG may address this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-0:2.6.18-194.32.1.el5.src", "5Client:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-0:2.6.18-194.32.1.el5.src", "5Server:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4157" }, { "category": "external", "summary": "RHBZ#651147", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=651147" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4157", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4157" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4157", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4157" } ], "release_date": "2010-11-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-01-04T16:49:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Client:kernel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-0:2.6.18-194.32.1.el5.src", "5Client:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-0:2.6.18-194.32.1.el5.src", "5Server:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2011:0004" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 6.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:H/Au:S/C:C/I:C/A:C", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-0:2.6.18-194.32.1.el5.src", "5Client:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-0:2.6.18-194.32.1.el5.src", "5Server:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: gdth: integer overflow in ioc_general()" }, { "acknowledgments": [ { "names": [ "Dan Rosenberg" ] } ], "cve": "CVE-2010-4161", "discovery_date": "2010-11-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "652534" } ], "notes": [ { "category": "description", "text": "The udp_queue_rcv_skb function in net/ipv4/udp.c in a certain Red Hat build of the Linux kernel 2.6.18 in Red Hat Enterprise Linux (RHEL) 5 allows attackers to cause a denial of service (deadlock and system hang) by sending UDP traffic to a socket that has a crafted socket filter, a related issue to CVE-2010-4158.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: rhel5 commit 6865201191 caused deadlock", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the version of Linux kernel as shipped with Red Hat Enterprise Linux 4 as it did not backport the upstream commit 93821778 that introduced this. It did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG as they have backported the upstream commit fda9ef5d that addressed this. Future kernel update in Red Hat Enterprise Linux 5 may address this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-0:2.6.18-194.32.1.el5.src", "5Client:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-0:2.6.18-194.32.1.el5.src", "5Server:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4161" }, { "category": "external", "summary": "RHBZ#652534", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=652534" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4161", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4161" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4161", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4161" } ], "release_date": "2010-11-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-01-04T16:49:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Client:kernel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-0:2.6.18-194.32.1.el5.src", "5Client:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-0:2.6.18-194.32.1.el5.src", "5Server:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2011:0004" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-0:2.6.18-194.32.1.el5.src", "5Client:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-0:2.6.18-194.32.1.el5.src", "5Server:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: rhel5 commit 6865201191 caused deadlock" }, { "acknowledgments": [ { "names": [ "Alan Cox" ] } ], "cve": "CVE-2010-4242", "discovery_date": "2010-10-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "641410" } ], "notes": [ { "category": "description", "text": "The hci_uart_tty_open function in the HCI UART driver (drivers/bluetooth/hci_ldisc.c) in the Linux kernel 2.6.36, and possibly other versions, does not verify whether the tty has a write operation, which allows local users to cause a denial of service (NULL pointer dereference) via vectors related to the Bluetooth driver.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: missing tty ops write function presence check in hci_uart_tty_open()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-0:2.6.18-194.32.1.el5.src", "5Client:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-0:2.6.18-194.32.1.el5.src", "5Server:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4242" }, { "category": "external", "summary": "RHBZ#641410", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=641410" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4242", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4242" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4242", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4242" } ], "release_date": "2010-10-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-01-04T16:49:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Client:kernel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-0:2.6.18-194.32.1.el5.src", "5Client:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-0:2.6.18-194.32.1.el5.src", "5Server:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2011:0004" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:H/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-0:2.6.18-194.32.1.el5.src", "5Client:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-0:2.6.18-194.32.1.el5.src", "5Server:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: missing tty ops write function presence check in hci_uart_tty_open()" }, { "cve": "CVE-2010-4247", "discovery_date": "2010-11-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "656206" } ], "notes": [ { "category": "description", "text": "The do_block_io_op function in (1) drivers/xen/blkback/blkback.c and (2) drivers/xen/blktap/blktap.c in Xen before 3.4.0 for the Linux kernel 2.6.18, and possibly other versions, allows guest OS users to cause a denial of service (infinite loop and CPU consumption) via a large production request index to the blkback or blktap back-end drivers. NOTE: some of these details are obtained from third party information.", "title": "Vulnerability description" }, { "category": "summary", "text": "xen: request-processing loop is unbounded in blkback", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-0:2.6.18-194.32.1.el5.src", "5Client:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-0:2.6.18-194.32.1.el5.src", "5Server:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4247" }, { "category": "external", "summary": "RHBZ#656206", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=656206" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4247", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4247" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4247", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4247" } ], "release_date": "2008-01-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-01-04T16:49:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Client:kernel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-0:2.6.18-194.32.1.el5.src", "5Client:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-0:2.6.18-194.32.1.el5.src", "5Server:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2011:0004" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 5.5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:S/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-0:2.6.18-194.32.1.el5.src", "5Client:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-0:2.6.18-194.32.1.el5.src", "5Server:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xen: request-processing loop is unbounded in blkback" }, { "cve": "CVE-2010-4248", "discovery_date": "2010-11-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "656264" } ], "notes": [ { "category": "description", "text": "Race condition in the __exit_signal function in kernel/exit.c in the Linux kernel before 2.6.37-rc2 allows local users to cause a denial of service via vectors related to multithreaded exec, the use of a thread group leader in kernel/posix-cpu-timers.c, and the selection of a new thread group leader in the de_thread function in fs/exec.c.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: posix-cpu-timers: workaround to suppress the problems with mt exec", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the version of Linux kernel as shipped with Red Hat Enterprise Linux 4 as it did not have support for CPU time clocks for the POSIX clock interface. This has been addressed in Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-0004.html, https://rhn.redhat.com/errata/RHSA-2011-0007.html and https://rhn.redhat.com/errata/RHSA-2011-0330.html.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-0:2.6.18-194.32.1.el5.src", "5Client:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-0:2.6.18-194.32.1.el5.src", "5Server:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4248" }, { "category": "external", "summary": "RHBZ#656264", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=656264" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4248", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4248" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4248", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4248" } ], "release_date": "2010-11-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-01-04T16:49:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Client:kernel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-0:2.6.18-194.32.1.el5.src", "5Client:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-0:2.6.18-194.32.1.el5.src", "5Server:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2011:0004" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-0:2.6.18-194.32.1.el5.src", "5Client:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-0:2.6.18-194.32.1.el5.src", "5Server:kernel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.32.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.32.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.32.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.32.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: posix-cpu-timers: workaround to suppress the problems with mt exec" } ] }
rhsa-2010:0842
Vulnerability from csaf_redhat
Published
2010-11-10 19:00
Modified
2024-11-22 03:55
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
Updated kernel packages that fix multiple security issues and several bugs
are now available for Red Hat Enterprise Linux 6.
The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
[Updated 22 November 2010]
The packages list in this erratum has been updated to include four missing
debuginfo-common packages (one per architecture). No changes have been made
to the original packages.
Details
The kernel packages contain the Linux kernel, the core of any Linux
operating system.
This update fixes the following security issues:
* Missing sanity checks in the Intel i915 driver in the Linux kernel could
allow a local, unprivileged user to escalate their privileges.
(CVE-2010-2962, Important)
* compat_alloc_user_space() in the Linux kernel 32/64-bit compatibility
layer implementation was missing sanity checks. This function could be
abused in other areas of the Linux kernel if its length argument can be
controlled from user-space. On 64-bit systems, a local, unprivileged user
could use this flaw to escalate their privileges. (CVE-2010-3081,
Important)
* A buffer overflow flaw in niu_get_ethtool_tcam_all() in the niu Ethernet
driver in the Linux kernel, could allow a local user to cause a denial of
service or escalate their privileges. (CVE-2010-3084, Important)
* A flaw in the IA32 system call emulation provided in 64-bit Linux kernels
could allow a local user to escalate their privileges. (CVE-2010-3301,
Important)
* A flaw in sctp_packet_config() in the Linux kernel's Stream Control
Transmission Protocol (SCTP) implementation could allow a remote attacker
to cause a denial of service. (CVE-2010-3432, Important)
* A missing integer overflow check in snd_ctl_new() in the Linux kernel's
sound subsystem could allow a local, unprivileged user on a 32-bit system
to cause a denial of service or escalate their privileges. (CVE-2010-3442,
Important)
* A flaw was found in sctp_auth_asoc_get_hmac() in the Linux kernel's SCTP
implementation. When iterating through the hmac_ids array, it did not reset
the last id element if it was out of range. This could allow a remote
attacker to cause a denial of service. (CVE-2010-3705, Important)
* A function in the Linux kernel's Reliable Datagram Sockets (RDS) protocol
implementation was missing sanity checks, which could allow a local,
unprivileged user to escalate their privileges. (CVE-2010-3904, Important)
* A flaw in drm_ioctl() in the Linux kernel's Direct Rendering Manager
(DRM) implementation could allow a local, unprivileged user to cause an
information leak. (CVE-2010-2803, Moderate)
* It was found that wireless drivers might not always clear allocated
buffers when handling a driver-specific IOCTL information request. A local
user could trigger this flaw to cause an information leak. (CVE-2010-2955,
Moderate)
* A NULL pointer dereference flaw in ftrace_regex_lseek() in the Linux
kernel's ftrace implementation could allow a local, unprivileged user to
cause a denial of service. Note: The debugfs file system must be mounted
locally to exploit this issue. It is not mounted by default.
(CVE-2010-3079, Moderate)
* A flaw in the Linux kernel's packet writing driver could be triggered
via the PKT_CTRL_CMD_STATUS IOCTL request, possibly allowing a local,
unprivileged user with access to "/dev/pktcdvd/control" to cause an
information leak. Note: By default, only users in the cdrom group have
access to "/dev/pktcdvd/control". (CVE-2010-3437, Moderate)
* A flaw was found in the way KVM (Kernel-based Virtual Machine) handled
the reloading of fs and gs segment registers when they had invalid
selectors. A privileged host user with access to "/dev/kvm" could use this
flaw to crash the host. (CVE-2010-3698, Moderate)
Red Hat would like to thank Kees Cook for reporting CVE-2010-2962 and
CVE-2010-2803; Ben Hawkes for reporting CVE-2010-3081 and CVE-2010-3301;
Dan Rosenberg for reporting CVE-2010-3442, CVE-2010-3705, CVE-2010-3904,
and CVE-2010-3437; and Robert Swiecki for reporting CVE-2010-3079.
This update also fixes several bugs. Documentation for these bug fixes will
be available shortly from the Technical Notes document linked to in the
References section.
Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages that fix multiple security issues and several bugs\nare now available for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.\n\n[Updated 22 November 2010]\nThe packages list in this erratum has been updated to include four missing\ndebuginfo-common packages (one per architecture). No changes have been made\nto the original packages.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues:\n\n* Missing sanity checks in the Intel i915 driver in the Linux kernel could\nallow a local, unprivileged user to escalate their privileges.\n(CVE-2010-2962, Important)\n\n* compat_alloc_user_space() in the Linux kernel 32/64-bit compatibility\nlayer implementation was missing sanity checks. This function could be\nabused in other areas of the Linux kernel if its length argument can be\ncontrolled from user-space. On 64-bit systems, a local, unprivileged user\ncould use this flaw to escalate their privileges. (CVE-2010-3081,\nImportant)\n\n* A buffer overflow flaw in niu_get_ethtool_tcam_all() in the niu Ethernet\ndriver in the Linux kernel, could allow a local user to cause a denial of\nservice or escalate their privileges. (CVE-2010-3084, Important)\n\n* A flaw in the IA32 system call emulation provided in 64-bit Linux kernels\ncould allow a local user to escalate their privileges. (CVE-2010-3301,\nImportant)\n\n* A flaw in sctp_packet_config() in the Linux kernel\u0027s Stream Control\nTransmission Protocol (SCTP) implementation could allow a remote attacker\nto cause a denial of service. (CVE-2010-3432, Important)\n\n* A missing integer overflow check in snd_ctl_new() in the Linux kernel\u0027s\nsound subsystem could allow a local, unprivileged user on a 32-bit system\nto cause a denial of service or escalate their privileges. (CVE-2010-3442,\nImportant)\n\n* A flaw was found in sctp_auth_asoc_get_hmac() in the Linux kernel\u0027s SCTP\nimplementation. When iterating through the hmac_ids array, it did not reset\nthe last id element if it was out of range. This could allow a remote\nattacker to cause a denial of service. (CVE-2010-3705, Important)\n\n* A function in the Linux kernel\u0027s Reliable Datagram Sockets (RDS) protocol\nimplementation was missing sanity checks, which could allow a local,\nunprivileged user to escalate their privileges. (CVE-2010-3904, Important)\n\n* A flaw in drm_ioctl() in the Linux kernel\u0027s Direct Rendering Manager\n(DRM) implementation could allow a local, unprivileged user to cause an\ninformation leak. (CVE-2010-2803, Moderate)\n\n* It was found that wireless drivers might not always clear allocated\nbuffers when handling a driver-specific IOCTL information request. A local\nuser could trigger this flaw to cause an information leak. (CVE-2010-2955,\nModerate)\n\n* A NULL pointer dereference flaw in ftrace_regex_lseek() in the Linux\nkernel\u0027s ftrace implementation could allow a local, unprivileged user to\ncause a denial of service. Note: The debugfs file system must be mounted\nlocally to exploit this issue. It is not mounted by default.\n(CVE-2010-3079, Moderate)\n\n* A flaw in the Linux kernel\u0027s packet writing driver could be triggered\nvia the PKT_CTRL_CMD_STATUS IOCTL request, possibly allowing a local,\nunprivileged user with access to \"/dev/pktcdvd/control\" to cause an\ninformation leak. Note: By default, only users in the cdrom group have\naccess to \"/dev/pktcdvd/control\". (CVE-2010-3437, Moderate)\n\n* A flaw was found in the way KVM (Kernel-based Virtual Machine) handled\nthe reloading of fs and gs segment registers when they had invalid\nselectors. A privileged host user with access to \"/dev/kvm\" could use this\nflaw to crash the host. (CVE-2010-3698, Moderate)\n\nRed Hat would like to thank Kees Cook for reporting CVE-2010-2962 and\nCVE-2010-2803; Ben Hawkes for reporting CVE-2010-3081 and CVE-2010-3301;\nDan Rosenberg for reporting CVE-2010-3442, CVE-2010-3705, CVE-2010-3904,\nand CVE-2010-3437; and Robert Swiecki for reporting CVE-2010-3079.\n\nThis update also fixes several bugs. Documentation for these bug fixes will\nbe available shortly from the Technical Notes document linked to in the\nReferences section.\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2010:0842", "url": "https://access.redhat.com/errata/RHSA-2010:0842" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/6/html-single/Technical_Notes/index.html#RHSA-2010:0842", "url": "http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/6/html-single/Technical_Notes/index.html#RHSA-2010:0842" }, { "category": "external", "summary": "621435", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=621435" }, { "category": "external", "summary": "628434", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628434" }, { "category": "external", "summary": "631623", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=631623" }, { "category": "external", "summary": "632069", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=632069" }, { "category": "external", "summary": "632292", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=632292" }, { "category": "external", "summary": "633864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=633864" }, { "category": "external", "summary": "633865", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=633865" }, { "category": "external", "summary": "633964", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=633964" }, { "category": "external", "summary": "633966", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=633966" }, { "category": "external", "summary": "634449", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=634449" }, { "category": "external", "summary": "634457", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=634457" }, { "category": "external", "summary": "634973", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=634973" }, { "category": "external", "summary": "634984", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=634984" }, { "category": "external", "summary": "635951", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=635951" }, { "category": "external", "summary": "636116", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=636116" }, { "category": "external", "summary": "637087", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=637087" }, { "category": "external", "summary": "637675", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=637675" }, { "category": "external", "summary": "637688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=637688" }, { "category": "external", "summary": "638085", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=638085" }, { "category": "external", "summary": "638478", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=638478" }, { "category": "external", "summary": "638973", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=638973" }, { "category": "external", "summary": "639412", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=639412" }, { "category": "external", "summary": "639879", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=639879" }, { "category": "external", "summary": "640036", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640036" }, { "category": "external", "summary": "641258", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=641258" }, { "category": "external", "summary": "641454", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=641454" }, { "category": "external", "summary": "641455", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=641455" }, { "category": "external", "summary": "641456", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=641456" }, { "category": "external", "summary": "641457", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=641457" }, { "category": "external", "summary": "641458", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=641458" }, { "category": "external", "summary": "641459", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=641459" }, { "category": "external", "summary": "641460", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=641460" }, { "category": "external", "summary": "641483", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=641483" }, { "category": "external", "summary": "641907", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=641907" }, { "category": "external", "summary": "642043", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=642043" }, { "category": "external", "summary": "642045", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=642045" }, { "category": "external", "summary": "642465", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=642465" }, { "category": "external", "summary": "642679", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=642679" }, { "category": "external", "summary": "642680", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=642680" }, { "category": "external", "summary": "642896", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=642896" }, { "category": "external", "summary": "644037", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=644037" }, { "category": "external", "summary": "644038", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=644038" }, { "category": "external", "summary": "644636", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=644636" }, { "category": "external", "summary": "644926", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=644926" }, { "category": "external", "summary": "646994", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=646994" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0842.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2024-11-22T03:55:57+00:00", "generator": { "date": "2024-11-22T03:55:57+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2010:0842", "initial_release_date": "2010-11-10T19:00:00+00:00", "revision_history": [ { "date": "2010-11-10T19:00:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2010-11-22T14:34:20+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T03:55:57+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "product": { "name": "kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "product_id": "kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-71.7.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-71.7.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-71.7.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "product": { "name": "kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "product_id": "kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-71.7.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "product_id": "kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-71.7.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-71.7.1.el6.x86_64", "product": { "name": "kernel-0:2.6.32-71.7.1.el6.x86_64", "product_id": "kernel-0:2.6.32-71.7.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-71.7.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "product": { "name": "kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "product_id": "kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-71.7.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "product_id": "kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-71.7.1.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "perf-0:2.6.32-71.7.1.el6.noarch", "product": { "name": "perf-0:2.6.32-71.7.1.el6.noarch", "product_id": "perf-0:2.6.32-71.7.1.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-71.7.1.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "product": { "name": "kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "product_id": "kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-71.7.1.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:2.6.32-71.7.1.el6.noarch", "product": { "name": "kernel-doc-0:2.6.32-71.7.1.el6.noarch", "product_id": "kernel-doc-0:2.6.32-71.7.1.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.32-71.7.1.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.32-71.7.1.el6.src", "product": { "name": "kernel-0:2.6.32-71.7.1.el6.src", "product_id": "kernel-0:2.6.32-71.7.1.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-71.7.1.el6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.32-71.7.1.el6.i686", "product": { "name": "kernel-devel-0:2.6.32-71.7.1.el6.i686", "product_id": "kernel-devel-0:2.6.32-71.7.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-71.7.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "product_id": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-71.7.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-71.7.1.el6.i686", "product": { "name": "kernel-debug-0:2.6.32-71.7.1.el6.i686", "product_id": "kernel-debug-0:2.6.32-71.7.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-71.7.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "product": { "name": "kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "product_id": "kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-i686@2.6.32-71.7.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "product": { "name": "kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "product_id": "kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-71.7.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-71.7.1.el6.i686", "product": { "name": "kernel-0:2.6.32-71.7.1.el6.i686", "product_id": "kernel-0:2.6.32-71.7.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-71.7.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-71.7.1.el6.i686", "product": { "name": "kernel-headers-0:2.6.32-71.7.1.el6.i686", "product_id": "kernel-headers-0:2.6.32-71.7.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-71.7.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "product": { "name": "kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "product_id": "kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-71.7.1.el6?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "product": { "name": "kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "product_id": "kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.32-71.7.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-71.7.1.el6.s390x", "product": { "name": "kernel-devel-0:2.6.32-71.7.1.el6.s390x", "product_id": "kernel-devel-0:2.6.32-71.7.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-71.7.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "product_id": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-71.7.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "product": { "name": "kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "product_id": "kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.32-71.7.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "product": { "name": "kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "product_id": "kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.32-71.7.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-71.7.1.el6.s390x", "product": { "name": "kernel-debug-0:2.6.32-71.7.1.el6.s390x", "product_id": "kernel-debug-0:2.6.32-71.7.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-71.7.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "product": { "name": "kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "product_id": "kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-71.7.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-71.7.1.el6.s390x", "product": { "name": "kernel-0:2.6.32-71.7.1.el6.s390x", "product_id": "kernel-0:2.6.32-71.7.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-71.7.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "product_id": "kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@2.6.32-71.7.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-71.7.1.el6.s390x", "product": { "name": "kernel-headers-0:2.6.32-71.7.1.el6.s390x", "product_id": "kernel-headers-0:2.6.32-71.7.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-71.7.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "product": { "name": "kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "product_id": "kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-71.7.1.el6?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "product": { "name": "kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "product_id": "kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-71.7.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "product_id": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-71.7.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "product": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "product_id": "kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@2.6.32-71.7.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "product": { "name": "kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "product_id": "kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-71.7.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "product_id": "kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-71.7.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-71.7.1.el6.ppc64", "product": { "name": "kernel-0:2.6.32-71.7.1.el6.ppc64", "product_id": "kernel-0:2.6.32-71.7.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-71.7.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "product": { "name": "kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "product_id": "kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@2.6.32-71.7.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "product": { "name": "kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "product_id": "kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-71.7.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "product": { "name": "kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "product_id": "kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-71.7.1.el6?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.7.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-0:2.6.32-71.7.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-71.7.1.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.7.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-71.7.1.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.7.1.el6.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-0:2.6.32-71.7.1.el6.src" }, "product_reference": "kernel-0:2.6.32-71.7.1.el6.src", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.7.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-71.7.1.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-71.7.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-71.7.1.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-71.7.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-71.7.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-71.7.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-71.7.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-71.7.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-71.7.1.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-71.7.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-71.7.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-71.7.1.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-71.7.1.el6.noarch", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-71.7.1.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-71.7.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-71.7.1.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-71.7.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-71.7.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-71.7.1.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:perf-0:2.6.32-71.7.1.el6.noarch" }, "product_reference": "perf-0:2.6.32-71.7.1.el6.noarch", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.7.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-71.7.1.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.7.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-71.7.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.7.1.el6.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src" }, "product_reference": "kernel-0:2.6.32-71.7.1.el6.src", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.7.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-71.7.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-71.7.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-71.7.1.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-71.7.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-71.7.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-71.7.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-71.7.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-71.7.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-71.7.1.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-71.7.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-71.7.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-71.7.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-71.7.1.el6.noarch", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-71.7.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-71.7.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-71.7.1.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-71.7.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-71.7.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-71.7.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch" }, "product_reference": "perf-0:2.6.32-71.7.1.el6.noarch", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.7.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-0:2.6.32-71.7.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-71.7.1.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.7.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-71.7.1.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.7.1.el6.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-0:2.6.32-71.7.1.el6.src" }, "product_reference": "kernel-0:2.6.32-71.7.1.el6.src", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.7.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-71.7.1.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-71.7.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-71.7.1.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-71.7.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-71.7.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-71.7.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-71.7.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-71.7.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-71.7.1.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-71.7.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-71.7.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-71.7.1.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-71.7.1.el6.noarch", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-71.7.1.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-71.7.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-71.7.1.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-71.7.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-71.7.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-71.7.1.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:perf-0:2.6.32-71.7.1.el6.noarch" }, "product_reference": "perf-0:2.6.32-71.7.1.el6.noarch", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.7.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-71.7.1.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.7.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-71.7.1.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.7.1.el6.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-0:2.6.32-71.7.1.el6.src" }, "product_reference": "kernel-0:2.6.32-71.7.1.el6.src", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.7.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-71.7.1.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-71.7.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-71.7.1.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-71.7.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-71.7.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-71.7.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-71.7.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-71.7.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-71.7.1.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-71.7.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-71.7.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-71.7.1.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-71.7.1.el6.noarch", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-71.7.1.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-71.7.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-71.7.1.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-71.7.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-71.7.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-71.7.1.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" }, "product_reference": "perf-0:2.6.32-71.7.1.el6.noarch", "relates_to_product_reference": "6Workstation" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Kees Cook" ] } ], "cve": "CVE-2010-2803", "discovery_date": "2010-08-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "621435" } ], "notes": [ { "category": "description", "text": "The drm_ioctl function in drivers/gpu/drm/drm_drv.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 2.6.27.53, 2.6.32.x before 2.6.32.21, 2.6.34.x before 2.6.34.6, and 2.6.35.x before 2.6.35.4 allows local users to obtain potentially sensitive information from kernel memory by requesting a large memory-allocation amount.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: drm ioctls infoleak", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the version of Linux kernel as shipped with Red Hat\nEnterprise Linux 3, 4, 5 and Red Hat Enterprise MRG as they did not include\nsupport for GPU DRM.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-2803" }, { "category": "external", "summary": "RHBZ#621435", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=621435" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-2803", "url": "https://www.cve.org/CVERecord?id=CVE-2010-2803" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-2803", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2803" } ], "release_date": "2010-08-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-10T19:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2010:0842" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: drm ioctls infoleak" }, { "cve": "CVE-2010-2955", "discovery_date": "2010-08-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "628434" } ], "notes": [ { "category": "description", "text": "The cfg80211_wext_giwessid function in net/wireless/wext-compat.c in the Linux kernel before 2.6.36-rc3-next-20100831 does not properly initialize certain structure members, which allows local users to leverage an off-by-one error in the ioctl_standard_iw_point function in net/wireless/wext-core.c, and obtain potentially sensitive information from kernel heap memory, via vectors involving an SIOCGIWESSID ioctl call that specifies a large buffer size.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: wireless: fix 64K kernel heap content leak via ioctl", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the version of Linux kernel as shipped with Red Hat Enterprise Linux 3, 4, and 5 as they did not backport the upstream commit 3d23e349 that had introduced the problem. A future update in Red Hat Enterprise MRG may address this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-2955" }, { "category": "external", "summary": "RHBZ#628434", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628434" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-2955", "url": "https://www.cve.org/CVERecord?id=CVE-2010-2955" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-2955", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2955" } ], "release_date": "2010-08-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-10T19:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2010:0842" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: wireless: fix 64K kernel heap content leak via ioctl" }, { "acknowledgments": [ { "names": [ "Kees Cook" ] } ], "cve": "CVE-2010-2962", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2010-09-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "637688" } ], "notes": [ { "category": "description", "text": "drivers/gpu/drm/i915/i915_gem.c in the Graphics Execution Manager (GEM) in the Intel i915 driver in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 2.6.36 does not properly validate pointers to blocks of memory, which allows local users to write to arbitrary kernel memory locations, and consequently gain privileges, via crafted use of the ioctl interface, related to (1) pwrite and (2) pread operations.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: arbitrary kernel memory write via i915 GEM ioctl", "title": "Vulnerability summary" }, { "category": "other", "text": "The Linux kernel as shipped with Red Hat Enterprise Linux 3, 4, 5, and Red Hat Enterprise MRG did not include support for Graphics Execution Manager (GEM) in the i915 driver, and therefore are not affected by this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-2962" }, { "category": "external", "summary": "RHBZ#637688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=637688" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-2962", "url": "https://www.cve.org/CVERecord?id=CVE-2010-2962" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-2962", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2962" } ], "release_date": "2010-10-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-10T19:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2010:0842" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: arbitrary kernel memory write via i915 GEM ioctl" }, { "acknowledgments": [ { "names": [ "Robert Swiecki" ], "organization": "Google Security Team" } ], "cve": "CVE-2010-3079", "discovery_date": "2010-09-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "631623" } ], "notes": [ { "category": "description", "text": "kernel/trace/ftrace.c in the Linux kernel before 2.6.35.5, when debugfs is enabled, does not properly handle interaction between mutex possession and llseek operations, which allows local users to cause a denial of service (NULL pointer dereference and outage of all function tracing files) via an lseek call on a file descriptor associated with the set_ftrace_filter file.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: ftrace NULL ptr deref", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 3, 4 and 5, as they do not include support for Ftrace. It did not affect Red Hat Enterprise MRG as it did not contain the upstream commit 8fc0c701 that introduced this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3079" }, { "category": "external", "summary": "RHBZ#631623", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=631623" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3079", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3079" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3079", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3079" } ], "release_date": "2010-09-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-10T19:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2010:0842" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.7, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: ftrace NULL ptr deref" }, { "acknowledgments": [ { "names": [ "Ben Hawkes" ] } ], "cve": "CVE-2010-3081", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2010-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "634457" } ], "notes": [ { "category": "description", "text": "The compat_alloc_user_space functions in include/asm/compat.h files in the Linux kernel before 2.6.36-rc4-git2 on 64-bit platforms do not properly allocate the userspace memory required for the 32-bit compatibility layer, which allows local users to gain privileges by leveraging the ability of the compat_mc_getsockopt function (aka the MCAST_MSFILTER getsockopt support) to control a certain length value, related to a \"stack pointer underflow\" issue, as exploited in the wild in September 2010.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: 64-bit Compatibility Mode Stack Pointer Underflow", "title": "Vulnerability summary" }, { "category": "other", "text": "More information can be found in this kbase: https://access.redhat.com/kb/docs/DOC-40265.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3081" }, { "category": "external", "summary": "RHBZ#634457", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=634457" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3081", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3081" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3081", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3081" } ], "release_date": "2010-09-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-10T19:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2010:0842" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: 64-bit Compatibility Mode Stack Pointer Underflow" }, { "cve": "CVE-2010-3084", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2010-09-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "632069" } ], "notes": [ { "category": "description", "text": "Buffer overflow in the niu_get_ethtool_tcam_all function in drivers/net/niu.c in the Linux kernel before 2.6.36-rc4 allows local users to cause a denial of service or possibly have unspecified other impact via the ETHTOOL_GRXCLSRLALL ethtool command.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: niu: buffer overflow for ETHTOOL_GRXCLSRLALL", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 3 and 4, as they do not include support for the Neptune Ethernet driver. It did not affect Red Hat Enterprise Linux 5 and Red Hat Enterprise MRG, as they do not contain the upstream commit 2d96cf8c that introduced this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3084" }, { "category": "external", "summary": "RHBZ#632069", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=632069" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3084", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3084" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3084", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3084" } ], "release_date": "2010-09-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-10T19:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2010:0842" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: niu: buffer overflow for ETHTOOL_GRXCLSRLALL" }, { "acknowledgments": [ { "names": [ "Ben Hawkes" ] } ], "cve": "CVE-2010-3301", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2010-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "634449" } ], "notes": [ { "category": "description", "text": "The IA32 system call emulation functionality in arch/x86/ia32/ia32entry.S in the Linux kernel before 2.6.36-rc4-git2 on the x86_64 platform does not zero extend the %eax register after the 32-bit entry path to ptrace is used, which allows local users to gain privileges by triggering an out-of-bounds access to the system call table using the %rax register. NOTE: this vulnerability exists because of a CVE-2007-4573 regression.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: IA32 System Call Entry Point Vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 3, 4, 5, and Red Hat Enterprise MRG, as they do not contain the upstream commit d4d67150 that introduced this flaw.\n\nMore information can be found in this kbase: https://access.redhat.com/kb/docs/DOC-40330", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3301" }, { "category": "external", "summary": "RHBZ#634449", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=634449" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3301", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3301" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3301", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3301" } ], "release_date": "2010-09-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-10T19:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2010:0842" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: IA32 System Call Entry Point Vulnerability" }, { "cve": "CVE-2010-3432", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2010-09-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "637675" } ], "notes": [ { "category": "description", "text": "The sctp_packet_config function in net/sctp/output.c in the Linux kernel before 2.6.35.6 performs extraneous initializations of packet data structures, which allows remote attackers to cause a denial of service (panic) via a certain sequence of SCTP traffic.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: sctp: do not reset the packet during sctp_packet_config", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the version of Linux kernel as shipped with Red Hat Enterprise Linux 3 as it did not include support for SCTP. This was addressed in Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2010-0958.html and https://rhn.redhat.com/errata/RHSA-2010-0842.html. Future updates in Red Hat Enterprise Linux 4 and 5 may address this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3432" }, { "category": "external", "summary": "RHBZ#637675", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=637675" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3432", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3432" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3432", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3432" } ], "release_date": "2010-09-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-10T19:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2010:0842" }, { "category": "workaround", "details": "For users that do not run applications that use SCTP, you can prevent the sctp module from being loaded by adding the following entry to the end of the /etc/modprobe.d/blacklist file:\n\nblacklist sctp\n\nThis way, the sctp module cannot be loaded accidentally, which may occur if an application that requires SCTP is started. A reboot is not necessary for this change to take effect.", "product_ids": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ] } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: sctp: do not reset the packet during sctp_packet_config" }, { "acknowledgments": [ { "names": [ "Dan Rosenberg" ] } ], "cve": "CVE-2010-3437", "discovery_date": "2010-09-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "638085" } ], "notes": [ { "category": "description", "text": "Integer signedness error in the pkt_find_dev_from_minor function in drivers/block/pktcdvd.c in the Linux kernel before 2.6.36-rc6 allows local users to obtain sensitive information from kernel memory or cause a denial of service (invalid pointer dereference and system crash) via a crafted index value in a PKT_CTRL_CMD_STATUS ioctl call.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: pktcdvd ioctl dev_minor missing range check", "title": "Vulnerability summary" }, { "category": "other", "text": "The Linux kernel as shipped with Red Hat Enterprise Linux 3 and 4 did not include support for Packet writing layer for ATAPI and SCSI disc media devices, and therefore are not affected by this issue. The Linux kernel as shipped with Red Hat Enterprise Linux 5 and Red Hat Enterprise MRG only allow root access to the \"/dev/pktcdvd/control\" file, and therefore are also not affected by this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3437" }, { "category": "external", "summary": "RHBZ#638085", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=638085" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3437", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3437" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3437", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3437" } ], "release_date": "2010-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-10T19:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2010:0842" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.7, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:N/A:N", "version": "2.0" }, "products": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: pktcdvd ioctl dev_minor missing range check" }, { "acknowledgments": [ { "names": [ "Dan Rosenberg" ] } ], "cve": "CVE-2010-3442", "discovery_date": "2010-09-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "638478" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in the snd_ctl_new function in sound/core/control.c in the Linux kernel before 2.6.36-rc5-next-20100929 allow local users to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a crafted (1) SNDRV_CTL_IOCTL_ELEM_ADD or (2) SNDRV_CTL_IOCTL_ELEM_REPLACE ioctl call.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: prevent heap corruption in snd_ctl_new()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3442" }, { "category": "external", "summary": "RHBZ#638478", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=638478" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3442", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3442" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3442", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3442" } ], "release_date": "2010-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-10T19:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2010:0842" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: prevent heap corruption in snd_ctl_new()" }, { "cve": "CVE-2010-3698", "discovery_date": "2010-09-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "639879" } ], "notes": [ { "category": "description", "text": "The KVM implementation in the Linux kernel before 2.6.36 does not properly reload the FS and GS segment registers, which allows host OS users to cause a denial of service (host OS crash) via a KVM_RUN ioctl call in conjunction with a modified Local Descriptor Table (LDT).", "title": "Vulnerability description" }, { "category": "summary", "text": "kvm: invalid selector in fs/gs causes kernel panic", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3698" }, { "category": "external", "summary": "RHBZ#639879", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=639879" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3698", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3698" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3698", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3698" } ], "release_date": "2010-10-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-10T19:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2010:0842" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 4.6, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:C", "version": "2.0" }, "products": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kvm: invalid selector in fs/gs causes kernel panic" }, { "acknowledgments": [ { "names": [ "Dan Rosenberg" ] } ], "cve": "CVE-2010-3705", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2010-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "640036" } ], "notes": [ { "category": "description", "text": "The sctp_auth_asoc_get_hmac function in net/sctp/auth.c in the Linux kernel before 2.6.36 does not properly validate the hmac_ids array of an SCTP peer, which allows remote attackers to cause a denial of service (memory corruption and panic) via a crafted value in the last element of this array.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: sctp memory corruption in HMAC handling", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is aware of this issue and is tracking it via the following bug:\nhttps://bugzilla.redhat.com/CVE-2010-3705.\n\nThis issue did not affect the version of Linux kernel as shipped with Red Hat Enterprise Linux 3 as it did not include support for SCTP. It did not affect Red Hat Enterprise Linux 4 and 5 as it did not include upstream commit 1f485649 that introduced the problem. Future kernel updates in Red Hat Enterprise MRG may address this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3705" }, { "category": "external", "summary": "RHBZ#640036", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640036" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3705", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3705" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3705", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3705" } ], "release_date": "2010-10-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-10T19:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2010:0842" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 8.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: sctp memory corruption in HMAC handling" }, { "acknowledgments": [ { "names": [ "Dan Rosenberg" ], "organization": "Virtual Security Research" } ], "cve": "CVE-2010-3904", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2010-10-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "642896" } ], "notes": [ { "category": "description", "text": "The rds_page_copy_user function in net/rds/page.c in the Reliable Datagram Sockets (RDS) protocol implementation in the Linux kernel before 2.6.36 does not properly validate addresses obtained from user space, which allows local users to gain privileges via crafted use of the sendmsg and recvmsg system calls.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: RDS sockets local privilege escalation", "title": "Vulnerability summary" }, { "category": "other", "text": "The Linux kernel as shipped with Red Hat Enterprise Linux 3, 4 and Red Hat Enterprise MRG did not include support for the RDS Protocol, and therefore are not affected by this issue. Updates for Red Hat Enterprise Linux 5 and 6 are available to address this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3904" }, { "category": "external", "summary": "RHBZ#642896", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=642896" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3904", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3904" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3904", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3904" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2010-10-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-10T19:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2010:0842" }, { "category": "workaround", "details": "For users that do not run applications that use RDS, you can prevent the rds module from being loaded by adding the following entry to the end of the /etc/modprobe.d/blacklist file:\n\nblacklist rds\n\nThis way, the rds module cannot be loaded accidentally, which may occur if an application that requires RDS is started. A reboot is not necessary for this change to take effect but do make sure the module is not loaded in the first place. You can verify that by running:\n\nlsmod | grep rds\n\nYou may also consider removing the CAP_SYS_MODULE capability from the current global capability set to prevent kernel modules from being loaded or unloaded. The CAP_SYS_MODULE has a capability number of 16 (see linux/capability.h). The default value has all the bits set. To remove this capability, you have to clear the 16th bit of the default 32-bit value, e.g. 0xffffff ^ (1 \u003c\u003c 16):\n\necho 0xFFFEFFFF \u003e /proc/sys/kernel/cap-bound", "product_ids": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ] } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ] } ], "threats": [ { "category": "exploit_status", "date": "2023-05-12T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "kernel: RDS sockets local privilege escalation" } ] }
rhsa-2010:0936
Vulnerability from csaf_redhat
Published
2010-12-01 22:21
Modified
2024-11-22 03:56
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
Updated kernel packages that fix two security issues and multiple bugs are
now available for Red Hat Enterprise Linux 4.
The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
[Update 6 December 2010]
The package list in this erratum has been updated to include the kernel-doc packages for the IA32 architecture.
Details
The kernel packages contain the Linux kernel, the core of any Linux
operating system.
Security fixes:
* A flaw in sctp_packet_config() in the Linux kernel's Stream Control
Transmission Protocol (SCTP) implementation could allow a remote attacker
to cause a denial of service. (CVE-2010-3432, Important)
* A missing integer overflow check in snd_ctl_new() in the Linux kernel's
sound subsystem could allow a local, unprivileged user on a 32-bit system
to cause a denial of service or escalate their privileges. (CVE-2010-3442,
Important)
Red Hat would like to thank Dan Rosenberg for reporting CVE-2010-3442.
Bug fixes:
* Forward time drift was observed on virtual machines using PM
timer-based kernel tick accounting and running on KVM or the Microsoft
Hyper-V Server hypervisor. Virtual machines that were booted with the
divider=x kernel parameter set to a value greater than 1 and that showed
the following in the kernel boot messages were subject to this issue:
time.c: Using PM based timekeeping
Fine grained accounting for the PM timer is introduced which eliminates
this issue. However, this fix uncovered a bug in the Xen hypervisor,
possibly causing backward time drift. If this erratum is installed in Xen
HVM guests that meet the aforementioned conditions, it is recommended that
the host use kernel-xen-2.6.18-194.26.1.el5 or newer, which includes a fix
(BZ#641915) for the backward time drift. (BZ#629237)
* With multipath enabled, systems would occasionally halt when the
do_cciss_request function was used. This was caused by wrongly-generated
requests. Additional checks have been added to avoid the aforementioned
issue. (BZ#640193)
* A Sun X4200 system equipped with a QLogic HBA spontaneously rebooted and
logged a Hyper-Transport Sync Flood Error to the system event log. A
Maximum Memory Read Byte Count restriction was added to fix this bug.
(BZ#640919)
* For an active/backup bonding network interface with VLANs on top of it,
when a link failed over, it took a minute for the multicast domain to be
rejoined. This was caused by the driver not sending any IGMP join packets.
The driver now sends IGMP join packets and the multicast domain is rejoined
immediately. (BZ#641002)
* Replacing a disk and trying to rebuild it afterwards caused the system to
panic. When a domain validation request for a hot plugged drive was sent,
the mptscsi driver did not validate its existence. This could result in the
driver accessing random memory and causing the crash. A check has been
added that describes the newly-added device and reloads the iocPg3 data
from the firmware if needed. (BZ#641137)
* An attempt to create a VLAN interface on a bond of two bnx2 adapters in
two switch configurations resulted in a soft lockup after a few seconds.
This was caused by an incorrect use of a bonding pointer. With this update,
soft lockups no longer occur and creating a VLAN interface works as
expected. (BZ#641254)
* Erroneous pointer checks could have caused a kernel panic. This was due
to a critical value not being copied when a network buffer was duplicated
and consumed by multiple portions of the kernel's network stack. Fixing the
copy operation resolved this bug. (BZ#642746)
* A typo in a variable name caused it to be dereferenced in either mkdir()
or create() which could cause a kernel panic. (BZ#643342)
* SCSI high level drivers can submit SCSI commands which would never be
completed when the device was offline. This was caused by a missing
callback for the request to complete the given command. SCSI requests are
now terminated by calling their callback when a device is offline.
(BZ#644816)
* A kernel panic could have occurred on systems due to a recursive lock in
the 3c59x driver. Recursion is now avoided and this kernel panic no longer
occurs. (BZ#648407)
Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages that fix two security issues and multiple bugs are\nnow available for Red Hat Enterprise Linux 4.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.\n\n[Update 6 December 2010]\nThe package list in this erratum has been updated to include the kernel-doc packages for the IA32 architecture.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nSecurity fixes:\n\n* A flaw in sctp_packet_config() in the Linux kernel\u0027s Stream Control\nTransmission Protocol (SCTP) implementation could allow a remote attacker\nto cause a denial of service. (CVE-2010-3432, Important)\n\n* A missing integer overflow check in snd_ctl_new() in the Linux kernel\u0027s\nsound subsystem could allow a local, unprivileged user on a 32-bit system\nto cause a denial of service or escalate their privileges. (CVE-2010-3442,\nImportant)\n\nRed Hat would like to thank Dan Rosenberg for reporting CVE-2010-3442.\n\nBug fixes:\n\n* Forward time drift was observed on virtual machines using PM\ntimer-based kernel tick accounting and running on KVM or the Microsoft\nHyper-V Server hypervisor. Virtual machines that were booted with the\ndivider=x kernel parameter set to a value greater than 1 and that showed\nthe following in the kernel boot messages were subject to this issue:\n\ntime.c: Using PM based timekeeping\n\nFine grained accounting for the PM timer is introduced which eliminates\nthis issue. However, this fix uncovered a bug in the Xen hypervisor,\npossibly causing backward time drift. If this erratum is installed in Xen\nHVM guests that meet the aforementioned conditions, it is recommended that\nthe host use kernel-xen-2.6.18-194.26.1.el5 or newer, which includes a fix\n(BZ#641915) for the backward time drift. (BZ#629237)\n\n* With multipath enabled, systems would occasionally halt when the\ndo_cciss_request function was used. This was caused by wrongly-generated\nrequests. Additional checks have been added to avoid the aforementioned\nissue. (BZ#640193)\n\n* A Sun X4200 system equipped with a QLogic HBA spontaneously rebooted and\nlogged a Hyper-Transport Sync Flood Error to the system event log. A\nMaximum Memory Read Byte Count restriction was added to fix this bug.\n(BZ#640919)\n\n* For an active/backup bonding network interface with VLANs on top of it,\nwhen a link failed over, it took a minute for the multicast domain to be\nrejoined. This was caused by the driver not sending any IGMP join packets.\nThe driver now sends IGMP join packets and the multicast domain is rejoined\nimmediately. (BZ#641002)\n\n* Replacing a disk and trying to rebuild it afterwards caused the system to\npanic. When a domain validation request for a hot plugged drive was sent,\nthe mptscsi driver did not validate its existence. This could result in the\ndriver accessing random memory and causing the crash. A check has been\nadded that describes the newly-added device and reloads the iocPg3 data\nfrom the firmware if needed. (BZ#641137)\n\n* An attempt to create a VLAN interface on a bond of two bnx2 adapters in\ntwo switch configurations resulted in a soft lockup after a few seconds.\nThis was caused by an incorrect use of a bonding pointer. With this update,\nsoft lockups no longer occur and creating a VLAN interface works as\nexpected. (BZ#641254)\n\n* Erroneous pointer checks could have caused a kernel panic. This was due\nto a critical value not being copied when a network buffer was duplicated\nand consumed by multiple portions of the kernel\u0027s network stack. Fixing the\ncopy operation resolved this bug. (BZ#642746)\n\n* A typo in a variable name caused it to be dereferenced in either mkdir()\nor create() which could cause a kernel panic. (BZ#643342)\n\n* SCSI high level drivers can submit SCSI commands which would never be\ncompleted when the device was offline. This was caused by a missing\ncallback for the request to complete the given command. SCSI requests are\nnow terminated by calling their callback when a device is offline.\n(BZ#644816)\n\n* A kernel panic could have occurred on systems due to a recursive lock in\nthe 3c59x driver. Recursion is now avoided and this kernel panic no longer\noccurs. (BZ#648407)\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2010:0936", "url": "https://access.redhat.com/errata/RHSA-2010:0936" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "629237", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=629237" }, { "category": "external", "summary": "637675", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=637675" }, { "category": "external", "summary": "638478", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=638478" }, { "category": "external", "summary": "640193", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640193" }, { "category": "external", "summary": "640919", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640919" }, { "category": "external", "summary": "641002", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=641002" }, { "category": "external", "summary": "641137", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=641137" }, { "category": "external", "summary": "641254", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=641254" }, { "category": "external", "summary": "642746", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=642746" }, { "category": "external", "summary": "643342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=643342" }, { "category": "external", "summary": "644816", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=644816" }, { "category": "external", "summary": "648407", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=648407" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0936.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2024-11-22T03:56:02+00:00", "generator": { "date": "2024-11-22T03:56:02+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2010:0936", "initial_release_date": "2010-12-01T22:21:00+00:00", "revision_history": [ { "date": "2010-12-01T22:21:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2010-12-06T09:19:04+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T03:56:02+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-xenU-0:2.6.9-89.33.1.EL.i686", "product": { "name": "kernel-xenU-0:2.6.9-89.33.1.EL.i686", "product_id": "kernel-xenU-0:2.6.9-89.33.1.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xenU@2.6.9-89.33.1.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-xenU-devel-0:2.6.9-89.33.1.EL.i686", "product": { "name": "kernel-xenU-devel-0:2.6.9-89.33.1.EL.i686", "product_id": "kernel-xenU-devel-0:2.6.9-89.33.1.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xenU-devel@2.6.9-89.33.1.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-hugemem-0:2.6.9-89.33.1.EL.i686", "product": { "name": "kernel-hugemem-0:2.6.9-89.33.1.EL.i686", "product_id": "kernel-hugemem-0:2.6.9-89.33.1.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem@2.6.9-89.33.1.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-smp-0:2.6.9-89.33.1.EL.i686", "product": { "name": "kernel-smp-0:2.6.9-89.33.1.EL.i686", "product_id": "kernel-smp-0:2.6.9-89.33.1.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.6.9-89.33.1.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-89.33.1.EL.i686", "product": { "name": "kernel-devel-0:2.6.9-89.33.1.EL.i686", "product_id": "kernel-devel-0:2.6.9-89.33.1.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.33.1.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-smp-devel-0:2.6.9-89.33.1.EL.i686", "product": { "name": "kernel-smp-devel-0:2.6.9-89.33.1.EL.i686", "product_id": "kernel-smp-devel-0:2.6.9-89.33.1.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-89.33.1.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-hugemem-devel-0:2.6.9-89.33.1.EL.i686", "product": { "name": "kernel-hugemem-devel-0:2.6.9-89.33.1.EL.i686", "product_id": "kernel-hugemem-devel-0:2.6.9-89.33.1.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem-devel@2.6.9-89.33.1.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-89.33.1.EL.i686", "product": { "name": "kernel-0:2.6.9-89.33.1.EL.i686", "product_id": "kernel-0:2.6.9-89.33.1.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.33.1.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-89.33.1.EL.i686", "product": { "name": "kernel-debuginfo-0:2.6.9-89.33.1.EL.i686", "product_id": "kernel-debuginfo-0:2.6.9-89.33.1.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.33.1.EL?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-xenU-0:2.6.9-89.33.1.EL.x86_64", "product": { "name": "kernel-xenU-0:2.6.9-89.33.1.EL.x86_64", "product_id": "kernel-xenU-0:2.6.9-89.33.1.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xenU@2.6.9-89.33.1.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xenU-devel-0:2.6.9-89.33.1.EL.x86_64", "product": { "name": "kernel-xenU-devel-0:2.6.9-89.33.1.EL.x86_64", "product_id": "kernel-xenU-devel-0:2.6.9-89.33.1.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xenU-devel@2.6.9-89.33.1.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-largesmp-devel-0:2.6.9-89.33.1.EL.x86_64", "product": { "name": "kernel-largesmp-devel-0:2.6.9-89.33.1.EL.x86_64", "product_id": "kernel-largesmp-devel-0:2.6.9-89.33.1.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-89.33.1.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-smp-0:2.6.9-89.33.1.EL.x86_64", "product": { "name": "kernel-smp-0:2.6.9-89.33.1.EL.x86_64", "product_id": "kernel-smp-0:2.6.9-89.33.1.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.6.9-89.33.1.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-89.33.1.EL.x86_64", "product": { "name": "kernel-devel-0:2.6.9-89.33.1.EL.x86_64", "product_id": "kernel-devel-0:2.6.9-89.33.1.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.33.1.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-smp-devel-0:2.6.9-89.33.1.EL.x86_64", "product": { "name": "kernel-smp-devel-0:2.6.9-89.33.1.EL.x86_64", "product_id": "kernel-smp-devel-0:2.6.9-89.33.1.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-89.33.1.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-89.33.1.EL.x86_64", "product": { "name": "kernel-0:2.6.9-89.33.1.EL.x86_64", "product_id": "kernel-0:2.6.9-89.33.1.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.33.1.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-largesmp-0:2.6.9-89.33.1.EL.x86_64", "product": { "name": "kernel-largesmp-0:2.6.9-89.33.1.EL.x86_64", "product_id": "kernel-largesmp-0:2.6.9-89.33.1.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-89.33.1.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-89.33.1.EL.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.9-89.33.1.EL.x86_64", "product_id": "kernel-debuginfo-0:2.6.9-89.33.1.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.33.1.EL?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.9-89.33.1.EL.noarch", "product": { "name": "kernel-doc-0:2.6.9-89.33.1.EL.noarch", "product_id": "kernel-doc-0:2.6.9-89.33.1.EL.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.9-89.33.1.EL?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ia64", "product": { "name": "kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ia64", "product_id": "kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-89.33.1.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-89.33.1.EL.ia64", "product": { "name": "kernel-devel-0:2.6.9-89.33.1.EL.ia64", "product_id": "kernel-devel-0:2.6.9-89.33.1.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.33.1.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-89.33.1.EL.ia64", "product": { "name": "kernel-0:2.6.9-89.33.1.EL.ia64", "product_id": "kernel-0:2.6.9-89.33.1.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.33.1.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-largesmp-0:2.6.9-89.33.1.EL.ia64", "product": { "name": "kernel-largesmp-0:2.6.9-89.33.1.EL.ia64", "product_id": "kernel-largesmp-0:2.6.9-89.33.1.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-89.33.1.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-89.33.1.EL.ia64", "product": { "name": "kernel-debuginfo-0:2.6.9-89.33.1.EL.ia64", "product_id": "kernel-debuginfo-0:2.6.9-89.33.1.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.33.1.EL?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.9-89.33.1.EL.src", "product": { "name": "kernel-0:2.6.9-89.33.1.EL.src", "product_id": "kernel-0:2.6.9-89.33.1.EL.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.33.1.EL?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ppc64", "product": { "name": "kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ppc64", "product_id": "kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-89.33.1.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-89.33.1.EL.ppc64", "product": { "name": "kernel-devel-0:2.6.9-89.33.1.EL.ppc64", "product_id": "kernel-devel-0:2.6.9-89.33.1.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.33.1.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-89.33.1.EL.ppc64", "product": { "name": "kernel-0:2.6.9-89.33.1.EL.ppc64", "product_id": "kernel-0:2.6.9-89.33.1.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.33.1.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-largesmp-0:2.6.9-89.33.1.EL.ppc64", "product": { "name": "kernel-largesmp-0:2.6.9-89.33.1.EL.ppc64", "product_id": "kernel-largesmp-0:2.6.9-89.33.1.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-89.33.1.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64", "product_id": "kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.33.1.EL?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-89.33.1.EL.ppc64iseries", "product": { "name": "kernel-devel-0:2.6.9-89.33.1.EL.ppc64iseries", "product_id": "kernel-devel-0:2.6.9-89.33.1.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.33.1.EL?arch=ppc64iseries" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-89.33.1.EL.ppc64iseries", "product": { "name": "kernel-0:2.6.9-89.33.1.EL.ppc64iseries", "product_id": "kernel-0:2.6.9-89.33.1.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.33.1.EL?arch=ppc64iseries" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64iseries", "product": { "name": "kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64iseries", "product_id": "kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.33.1.EL?arch=ppc64iseries" } } } ], "category": "architecture", "name": "ppc64iseries" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-89.33.1.EL.s390x", "product": { "name": "kernel-devel-0:2.6.9-89.33.1.EL.s390x", "product_id": "kernel-devel-0:2.6.9-89.33.1.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.33.1.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-89.33.1.EL.s390x", "product": { "name": "kernel-0:2.6.9-89.33.1.EL.s390x", "product_id": "kernel-0:2.6.9-89.33.1.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.33.1.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-89.33.1.EL.s390x", "product": { "name": "kernel-debuginfo-0:2.6.9-89.33.1.EL.s390x", "product_id": "kernel-debuginfo-0:2.6.9-89.33.1.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.33.1.EL?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-89.33.1.EL.s390", "product": { "name": "kernel-devel-0:2.6.9-89.33.1.EL.s390", "product_id": "kernel-devel-0:2.6.9-89.33.1.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.33.1.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-89.33.1.EL.s390", "product": { "name": "kernel-0:2.6.9-89.33.1.EL.s390", "product_id": "kernel-0:2.6.9-89.33.1.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.33.1.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-89.33.1.EL.s390", "product": { "name": "kernel-debuginfo-0:2.6.9-89.33.1.EL.s390", "product_id": "kernel-debuginfo-0:2.6.9-89.33.1.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.33.1.EL?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.33.1.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.33.1.EL.i686" }, "product_reference": "kernel-0:2.6.9-89.33.1.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.33.1.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.33.1.EL.ia64" }, "product_reference": "kernel-0:2.6.9-89.33.1.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.33.1.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.33.1.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-89.33.1.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.33.1.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.33.1.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-89.33.1.EL.ppc64iseries", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.33.1.EL.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.33.1.EL.s390" }, "product_reference": "kernel-0:2.6.9-89.33.1.EL.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.33.1.EL.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.33.1.EL.s390x" }, "product_reference": "kernel-0:2.6.9-89.33.1.EL.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.33.1.EL.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.33.1.EL.src" }, "product_reference": "kernel-0:2.6.9-89.33.1.EL.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.33.1.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.33.1.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-89.33.1.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.33.1.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.33.1.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.33.1.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.33.1.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.33.1.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.33.1.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64iseries", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.33.1.EL.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.33.1.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.33.1.EL.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.33.1.EL.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.33.1.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.33.1.EL.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.33.1.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.33.1.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.33.1.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.33.1.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-89.33.1.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-89.33.1.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.33.1.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-89.33.1.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-89.33.1.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.33.1.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-89.33.1.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-89.33.1.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.33.1.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-89.33.1.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-89.33.1.EL.ppc64iseries", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.33.1.EL.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-89.33.1.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-89.33.1.EL.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.33.1.EL.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-89.33.1.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-89.33.1.EL.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.33.1.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-89.33.1.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-89.33.1.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-89.33.1.EL.noarch as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-doc-0:2.6.9-89.33.1.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-89.33.1.EL.noarch", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-89.33.1.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-hugemem-0:2.6.9-89.33.1.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-89.33.1.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-89.33.1.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-hugemem-devel-0:2.6.9-89.33.1.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-89.33.1.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.33.1.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-0:2.6.9-89.33.1.EL.ia64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.33.1.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.33.1.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-0:2.6.9-89.33.1.EL.ppc64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.33.1.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.33.1.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-0:2.6.9-89.33.1.EL.x86_64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.33.1.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ia64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ppc64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.33.1.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.x86_64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.33.1.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.33.1.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-0:2.6.9-89.33.1.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-89.33.1.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.33.1.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-0:2.6.9-89.33.1.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-89.33.1.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.33.1.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-devel-0:2.6.9-89.33.1.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.33.1.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.33.1.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-devel-0:2.6.9-89.33.1.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.33.1.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.33.1.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-xenU-0:2.6.9-89.33.1.EL.i686" }, "product_reference": "kernel-xenU-0:2.6.9-89.33.1.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.33.1.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-xenU-0:2.6.9-89.33.1.EL.x86_64" }, "product_reference": "kernel-xenU-0:2.6.9-89.33.1.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.33.1.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-xenU-devel-0:2.6.9-89.33.1.EL.i686" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.33.1.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.33.1.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-xenU-devel-0:2.6.9-89.33.1.EL.x86_64" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.33.1.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.33.1.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.33.1.EL.i686" }, "product_reference": "kernel-0:2.6.9-89.33.1.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.33.1.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.33.1.EL.ia64" }, "product_reference": "kernel-0:2.6.9-89.33.1.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.33.1.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.33.1.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-89.33.1.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.33.1.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.33.1.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-89.33.1.EL.ppc64iseries", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.33.1.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.33.1.EL.s390" }, "product_reference": "kernel-0:2.6.9-89.33.1.EL.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.33.1.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.33.1.EL.s390x" }, "product_reference": "kernel-0:2.6.9-89.33.1.EL.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.33.1.EL.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.33.1.EL.src" }, "product_reference": "kernel-0:2.6.9-89.33.1.EL.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.33.1.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.33.1.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-89.33.1.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.33.1.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.33.1.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.33.1.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.33.1.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.33.1.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.33.1.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64iseries", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.33.1.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.33.1.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.33.1.EL.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.33.1.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.33.1.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.33.1.EL.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.33.1.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.33.1.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.33.1.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.33.1.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-89.33.1.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-89.33.1.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.33.1.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-89.33.1.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-89.33.1.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.33.1.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-89.33.1.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-89.33.1.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.33.1.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-89.33.1.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-89.33.1.EL.ppc64iseries", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.33.1.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-89.33.1.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-89.33.1.EL.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.33.1.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-89.33.1.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-89.33.1.EL.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.33.1.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-89.33.1.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-89.33.1.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-89.33.1.EL.noarch as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-doc-0:2.6.9-89.33.1.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-89.33.1.EL.noarch", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-89.33.1.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-hugemem-0:2.6.9-89.33.1.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-89.33.1.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-89.33.1.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-hugemem-devel-0:2.6.9-89.33.1.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-89.33.1.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.33.1.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-0:2.6.9-89.33.1.EL.ia64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.33.1.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.33.1.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-0:2.6.9-89.33.1.EL.ppc64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.33.1.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.33.1.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-0:2.6.9-89.33.1.EL.x86_64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.33.1.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ia64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ppc64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.33.1.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.x86_64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.33.1.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.33.1.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-0:2.6.9-89.33.1.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-89.33.1.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.33.1.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-0:2.6.9-89.33.1.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-89.33.1.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.33.1.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-devel-0:2.6.9-89.33.1.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.33.1.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.33.1.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-devel-0:2.6.9-89.33.1.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.33.1.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.33.1.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-xenU-0:2.6.9-89.33.1.EL.i686" }, "product_reference": "kernel-xenU-0:2.6.9-89.33.1.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.33.1.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-xenU-0:2.6.9-89.33.1.EL.x86_64" }, "product_reference": "kernel-xenU-0:2.6.9-89.33.1.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.33.1.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-xenU-devel-0:2.6.9-89.33.1.EL.i686" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.33.1.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.33.1.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-xenU-devel-0:2.6.9-89.33.1.EL.x86_64" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.33.1.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.33.1.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.33.1.EL.i686" }, "product_reference": "kernel-0:2.6.9-89.33.1.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.33.1.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.33.1.EL.ia64" }, "product_reference": "kernel-0:2.6.9-89.33.1.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.33.1.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.33.1.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-89.33.1.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.33.1.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.33.1.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-89.33.1.EL.ppc64iseries", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.33.1.EL.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.33.1.EL.s390" }, "product_reference": "kernel-0:2.6.9-89.33.1.EL.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.33.1.EL.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.33.1.EL.s390x" }, "product_reference": "kernel-0:2.6.9-89.33.1.EL.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.33.1.EL.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.33.1.EL.src" }, "product_reference": "kernel-0:2.6.9-89.33.1.EL.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.33.1.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.33.1.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-89.33.1.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.33.1.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.33.1.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.33.1.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.33.1.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.33.1.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.33.1.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64iseries", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.33.1.EL.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.33.1.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.33.1.EL.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.33.1.EL.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.33.1.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.33.1.EL.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.33.1.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.33.1.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.33.1.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.33.1.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-89.33.1.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-89.33.1.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.33.1.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-89.33.1.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-89.33.1.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.33.1.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-89.33.1.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-89.33.1.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.33.1.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-89.33.1.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-89.33.1.EL.ppc64iseries", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.33.1.EL.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-89.33.1.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-89.33.1.EL.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.33.1.EL.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-89.33.1.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-89.33.1.EL.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.33.1.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-89.33.1.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-89.33.1.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-89.33.1.EL.noarch as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-doc-0:2.6.9-89.33.1.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-89.33.1.EL.noarch", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-89.33.1.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-hugemem-0:2.6.9-89.33.1.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-89.33.1.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-89.33.1.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-hugemem-devel-0:2.6.9-89.33.1.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-89.33.1.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.33.1.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-0:2.6.9-89.33.1.EL.ia64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.33.1.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.33.1.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-0:2.6.9-89.33.1.EL.ppc64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.33.1.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.33.1.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-0:2.6.9-89.33.1.EL.x86_64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.33.1.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ia64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ppc64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.33.1.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.x86_64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.33.1.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.33.1.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-0:2.6.9-89.33.1.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-89.33.1.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.33.1.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-0:2.6.9-89.33.1.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-89.33.1.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.33.1.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-devel-0:2.6.9-89.33.1.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.33.1.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.33.1.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-devel-0:2.6.9-89.33.1.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.33.1.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.33.1.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-xenU-0:2.6.9-89.33.1.EL.i686" }, "product_reference": "kernel-xenU-0:2.6.9-89.33.1.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.33.1.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-xenU-0:2.6.9-89.33.1.EL.x86_64" }, "product_reference": "kernel-xenU-0:2.6.9-89.33.1.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.33.1.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-xenU-devel-0:2.6.9-89.33.1.EL.i686" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.33.1.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.33.1.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-xenU-devel-0:2.6.9-89.33.1.EL.x86_64" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.33.1.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.33.1.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.33.1.EL.i686" }, "product_reference": "kernel-0:2.6.9-89.33.1.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.33.1.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.33.1.EL.ia64" }, "product_reference": "kernel-0:2.6.9-89.33.1.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.33.1.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.33.1.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-89.33.1.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.33.1.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.33.1.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-89.33.1.EL.ppc64iseries", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.33.1.EL.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.33.1.EL.s390" }, "product_reference": "kernel-0:2.6.9-89.33.1.EL.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.33.1.EL.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.33.1.EL.s390x" }, "product_reference": "kernel-0:2.6.9-89.33.1.EL.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.33.1.EL.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.33.1.EL.src" }, "product_reference": "kernel-0:2.6.9-89.33.1.EL.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.33.1.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.33.1.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-89.33.1.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.33.1.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.33.1.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.33.1.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.33.1.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.33.1.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.33.1.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64iseries", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.33.1.EL.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.33.1.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.33.1.EL.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.33.1.EL.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.33.1.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.33.1.EL.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.33.1.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.33.1.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.33.1.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.33.1.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-89.33.1.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-89.33.1.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.33.1.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-89.33.1.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-89.33.1.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.33.1.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-89.33.1.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-89.33.1.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.33.1.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-89.33.1.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-89.33.1.EL.ppc64iseries", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.33.1.EL.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-89.33.1.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-89.33.1.EL.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.33.1.EL.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-89.33.1.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-89.33.1.EL.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.33.1.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-89.33.1.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-89.33.1.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-89.33.1.EL.noarch as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-doc-0:2.6.9-89.33.1.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-89.33.1.EL.noarch", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-89.33.1.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-hugemem-0:2.6.9-89.33.1.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-89.33.1.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-89.33.1.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-hugemem-devel-0:2.6.9-89.33.1.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-89.33.1.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.33.1.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-0:2.6.9-89.33.1.EL.ia64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.33.1.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.33.1.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-0:2.6.9-89.33.1.EL.ppc64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.33.1.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.33.1.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-0:2.6.9-89.33.1.EL.x86_64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.33.1.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ia64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ppc64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.33.1.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.x86_64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.33.1.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.33.1.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-0:2.6.9-89.33.1.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-89.33.1.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.33.1.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-0:2.6.9-89.33.1.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-89.33.1.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.33.1.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-devel-0:2.6.9-89.33.1.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.33.1.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.33.1.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-devel-0:2.6.9-89.33.1.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.33.1.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.33.1.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-xenU-0:2.6.9-89.33.1.EL.i686" }, "product_reference": "kernel-xenU-0:2.6.9-89.33.1.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.33.1.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-xenU-0:2.6.9-89.33.1.EL.x86_64" }, "product_reference": "kernel-xenU-0:2.6.9-89.33.1.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.33.1.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-xenU-devel-0:2.6.9-89.33.1.EL.i686" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.33.1.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.33.1.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-xenU-devel-0:2.6.9-89.33.1.EL.x86_64" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.33.1.EL.x86_64", "relates_to_product_reference": "4WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2010-3432", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2010-09-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "637675" } ], "notes": [ { "category": "description", "text": "The sctp_packet_config function in net/sctp/output.c in the Linux kernel before 2.6.35.6 performs extraneous initializations of packet data structures, which allows remote attackers to cause a denial of service (panic) via a certain sequence of SCTP traffic.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: sctp: do not reset the packet during sctp_packet_config", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the version of Linux kernel as shipped with Red Hat Enterprise Linux 3 as it did not include support for SCTP. This was addressed in Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2010-0958.html and https://rhn.redhat.com/errata/RHSA-2010-0842.html. Future updates in Red Hat Enterprise Linux 4 and 5 may address this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-89.33.1.EL.i686", "4AS:kernel-0:2.6.9-89.33.1.EL.ia64", "4AS:kernel-0:2.6.9-89.33.1.EL.ppc64", "4AS:kernel-0:2.6.9-89.33.1.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.33.1.EL.s390", "4AS:kernel-0:2.6.9-89.33.1.EL.s390x", "4AS:kernel-0:2.6.9-89.33.1.EL.src", "4AS:kernel-0:2.6.9-89.33.1.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.33.1.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.33.1.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.33.1.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.33.1.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.33.1.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.33.1.EL.i686", "4AS:kernel-devel-0:2.6.9-89.33.1.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.33.1.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.33.1.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.33.1.EL.s390", "4AS:kernel-devel-0:2.6.9-89.33.1.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.33.1.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.33.1.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.33.1.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.33.1.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.33.1.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.33.1.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.33.1.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.33.1.EL.i686", "4AS:kernel-smp-0:2.6.9-89.33.1.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.33.1.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.33.1.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.33.1.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.33.1.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.33.1.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.33.1.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.33.1.EL.i686", "4Desktop:kernel-0:2.6.9-89.33.1.EL.ia64", "4Desktop:kernel-0:2.6.9-89.33.1.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.33.1.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.33.1.EL.s390", "4Desktop:kernel-0:2.6.9-89.33.1.EL.s390x", "4Desktop:kernel-0:2.6.9-89.33.1.EL.src", "4Desktop:kernel-0:2.6.9-89.33.1.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.33.1.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.33.1.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.33.1.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.33.1.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.33.1.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.33.1.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.33.1.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.33.1.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.33.1.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.33.1.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.33.1.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.33.1.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.33.1.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.33.1.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.33.1.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.33.1.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.33.1.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.33.1.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.33.1.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.33.1.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.33.1.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.33.1.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.33.1.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.33.1.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.33.1.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.33.1.EL.x86_64", "4ES:kernel-0:2.6.9-89.33.1.EL.i686", "4ES:kernel-0:2.6.9-89.33.1.EL.ia64", "4ES:kernel-0:2.6.9-89.33.1.EL.ppc64", "4ES:kernel-0:2.6.9-89.33.1.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.33.1.EL.s390", "4ES:kernel-0:2.6.9-89.33.1.EL.s390x", "4ES:kernel-0:2.6.9-89.33.1.EL.src", "4ES:kernel-0:2.6.9-89.33.1.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.33.1.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.33.1.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.33.1.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.33.1.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.33.1.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.33.1.EL.i686", "4ES:kernel-devel-0:2.6.9-89.33.1.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.33.1.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.33.1.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.33.1.EL.s390", "4ES:kernel-devel-0:2.6.9-89.33.1.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.33.1.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.33.1.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.33.1.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.33.1.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.33.1.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.33.1.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.33.1.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.33.1.EL.i686", "4ES:kernel-smp-0:2.6.9-89.33.1.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.33.1.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.33.1.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.33.1.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.33.1.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.33.1.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.33.1.EL.x86_64", "4WS:kernel-0:2.6.9-89.33.1.EL.i686", "4WS:kernel-0:2.6.9-89.33.1.EL.ia64", "4WS:kernel-0:2.6.9-89.33.1.EL.ppc64", "4WS:kernel-0:2.6.9-89.33.1.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.33.1.EL.s390", "4WS:kernel-0:2.6.9-89.33.1.EL.s390x", "4WS:kernel-0:2.6.9-89.33.1.EL.src", "4WS:kernel-0:2.6.9-89.33.1.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.33.1.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.33.1.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.33.1.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.33.1.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.33.1.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.33.1.EL.i686", "4WS:kernel-devel-0:2.6.9-89.33.1.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.33.1.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.33.1.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.33.1.EL.s390", "4WS:kernel-devel-0:2.6.9-89.33.1.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.33.1.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.33.1.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.33.1.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.33.1.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.33.1.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.33.1.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.33.1.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.33.1.EL.i686", "4WS:kernel-smp-0:2.6.9-89.33.1.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.33.1.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.33.1.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.33.1.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.33.1.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.33.1.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.33.1.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3432" }, { "category": "external", "summary": "RHBZ#637675", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=637675" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3432", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3432" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3432", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3432" } ], "release_date": "2010-09-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-12-01T22:21:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "4AS:kernel-0:2.6.9-89.33.1.EL.i686", "4AS:kernel-0:2.6.9-89.33.1.EL.ia64", "4AS:kernel-0:2.6.9-89.33.1.EL.ppc64", "4AS:kernel-0:2.6.9-89.33.1.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.33.1.EL.s390", "4AS:kernel-0:2.6.9-89.33.1.EL.s390x", "4AS:kernel-0:2.6.9-89.33.1.EL.src", "4AS:kernel-0:2.6.9-89.33.1.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.33.1.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.33.1.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.33.1.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.33.1.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.33.1.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.33.1.EL.i686", "4AS:kernel-devel-0:2.6.9-89.33.1.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.33.1.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.33.1.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.33.1.EL.s390", "4AS:kernel-devel-0:2.6.9-89.33.1.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.33.1.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.33.1.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.33.1.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.33.1.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.33.1.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.33.1.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.33.1.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.33.1.EL.i686", "4AS:kernel-smp-0:2.6.9-89.33.1.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.33.1.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.33.1.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.33.1.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.33.1.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.33.1.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.33.1.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.33.1.EL.i686", "4Desktop:kernel-0:2.6.9-89.33.1.EL.ia64", "4Desktop:kernel-0:2.6.9-89.33.1.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.33.1.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.33.1.EL.s390", "4Desktop:kernel-0:2.6.9-89.33.1.EL.s390x", "4Desktop:kernel-0:2.6.9-89.33.1.EL.src", "4Desktop:kernel-0:2.6.9-89.33.1.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.33.1.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.33.1.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.33.1.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.33.1.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.33.1.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.33.1.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.33.1.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.33.1.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.33.1.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.33.1.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.33.1.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.33.1.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.33.1.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.33.1.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.33.1.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.33.1.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.33.1.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.33.1.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.33.1.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.33.1.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.33.1.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.33.1.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.33.1.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.33.1.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.33.1.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.33.1.EL.x86_64", "4ES:kernel-0:2.6.9-89.33.1.EL.i686", "4ES:kernel-0:2.6.9-89.33.1.EL.ia64", "4ES:kernel-0:2.6.9-89.33.1.EL.ppc64", "4ES:kernel-0:2.6.9-89.33.1.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.33.1.EL.s390", "4ES:kernel-0:2.6.9-89.33.1.EL.s390x", "4ES:kernel-0:2.6.9-89.33.1.EL.src", "4ES:kernel-0:2.6.9-89.33.1.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.33.1.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.33.1.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.33.1.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.33.1.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.33.1.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.33.1.EL.i686", "4ES:kernel-devel-0:2.6.9-89.33.1.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.33.1.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.33.1.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.33.1.EL.s390", "4ES:kernel-devel-0:2.6.9-89.33.1.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.33.1.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.33.1.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.33.1.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.33.1.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.33.1.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.33.1.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.33.1.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.33.1.EL.i686", "4ES:kernel-smp-0:2.6.9-89.33.1.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.33.1.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.33.1.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.33.1.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.33.1.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.33.1.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.33.1.EL.x86_64", "4WS:kernel-0:2.6.9-89.33.1.EL.i686", "4WS:kernel-0:2.6.9-89.33.1.EL.ia64", "4WS:kernel-0:2.6.9-89.33.1.EL.ppc64", "4WS:kernel-0:2.6.9-89.33.1.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.33.1.EL.s390", "4WS:kernel-0:2.6.9-89.33.1.EL.s390x", "4WS:kernel-0:2.6.9-89.33.1.EL.src", "4WS:kernel-0:2.6.9-89.33.1.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.33.1.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.33.1.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.33.1.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.33.1.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.33.1.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.33.1.EL.i686", "4WS:kernel-devel-0:2.6.9-89.33.1.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.33.1.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.33.1.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.33.1.EL.s390", "4WS:kernel-devel-0:2.6.9-89.33.1.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.33.1.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.33.1.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.33.1.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.33.1.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.33.1.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.33.1.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.33.1.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.33.1.EL.i686", "4WS:kernel-smp-0:2.6.9-89.33.1.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.33.1.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.33.1.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.33.1.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.33.1.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.33.1.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.33.1.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0936" }, { "category": "workaround", "details": "For users that do not run applications that use SCTP, you can prevent the sctp module from being loaded by adding the following entry to the end of the /etc/modprobe.d/blacklist file:\n\nblacklist sctp\n\nThis way, the sctp module cannot be loaded accidentally, which may occur if an application that requires SCTP is started. A reboot is not necessary for this change to take effect.", "product_ids": [ "4AS:kernel-0:2.6.9-89.33.1.EL.i686", "4AS:kernel-0:2.6.9-89.33.1.EL.ia64", "4AS:kernel-0:2.6.9-89.33.1.EL.ppc64", "4AS:kernel-0:2.6.9-89.33.1.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.33.1.EL.s390", "4AS:kernel-0:2.6.9-89.33.1.EL.s390x", "4AS:kernel-0:2.6.9-89.33.1.EL.src", "4AS:kernel-0:2.6.9-89.33.1.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.33.1.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.33.1.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.33.1.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.33.1.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.33.1.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.33.1.EL.i686", "4AS:kernel-devel-0:2.6.9-89.33.1.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.33.1.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.33.1.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.33.1.EL.s390", "4AS:kernel-devel-0:2.6.9-89.33.1.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.33.1.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.33.1.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.33.1.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.33.1.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.33.1.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.33.1.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.33.1.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.33.1.EL.i686", "4AS:kernel-smp-0:2.6.9-89.33.1.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.33.1.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.33.1.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.33.1.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.33.1.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.33.1.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.33.1.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.33.1.EL.i686", "4Desktop:kernel-0:2.6.9-89.33.1.EL.ia64", "4Desktop:kernel-0:2.6.9-89.33.1.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.33.1.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.33.1.EL.s390", "4Desktop:kernel-0:2.6.9-89.33.1.EL.s390x", "4Desktop:kernel-0:2.6.9-89.33.1.EL.src", "4Desktop:kernel-0:2.6.9-89.33.1.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.33.1.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.33.1.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.33.1.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.33.1.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.33.1.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.33.1.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.33.1.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.33.1.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.33.1.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.33.1.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.33.1.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.33.1.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.33.1.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.33.1.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.33.1.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.33.1.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.33.1.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.33.1.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.33.1.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.33.1.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.33.1.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.33.1.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.33.1.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.33.1.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.33.1.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.33.1.EL.x86_64", "4ES:kernel-0:2.6.9-89.33.1.EL.i686", "4ES:kernel-0:2.6.9-89.33.1.EL.ia64", "4ES:kernel-0:2.6.9-89.33.1.EL.ppc64", "4ES:kernel-0:2.6.9-89.33.1.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.33.1.EL.s390", "4ES:kernel-0:2.6.9-89.33.1.EL.s390x", "4ES:kernel-0:2.6.9-89.33.1.EL.src", "4ES:kernel-0:2.6.9-89.33.1.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.33.1.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.33.1.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.33.1.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.33.1.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.33.1.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.33.1.EL.i686", "4ES:kernel-devel-0:2.6.9-89.33.1.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.33.1.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.33.1.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.33.1.EL.s390", "4ES:kernel-devel-0:2.6.9-89.33.1.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.33.1.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.33.1.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.33.1.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.33.1.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.33.1.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.33.1.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.33.1.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.33.1.EL.i686", "4ES:kernel-smp-0:2.6.9-89.33.1.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.33.1.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.33.1.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.33.1.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.33.1.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.33.1.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.33.1.EL.x86_64", "4WS:kernel-0:2.6.9-89.33.1.EL.i686", "4WS:kernel-0:2.6.9-89.33.1.EL.ia64", "4WS:kernel-0:2.6.9-89.33.1.EL.ppc64", "4WS:kernel-0:2.6.9-89.33.1.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.33.1.EL.s390", "4WS:kernel-0:2.6.9-89.33.1.EL.s390x", "4WS:kernel-0:2.6.9-89.33.1.EL.src", "4WS:kernel-0:2.6.9-89.33.1.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.33.1.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.33.1.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.33.1.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.33.1.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.33.1.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.33.1.EL.i686", "4WS:kernel-devel-0:2.6.9-89.33.1.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.33.1.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.33.1.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.33.1.EL.s390", "4WS:kernel-devel-0:2.6.9-89.33.1.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.33.1.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.33.1.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.33.1.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.33.1.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.33.1.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.33.1.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.33.1.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.33.1.EL.i686", "4WS:kernel-smp-0:2.6.9-89.33.1.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.33.1.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.33.1.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.33.1.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.33.1.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.33.1.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.33.1.EL.x86_64" ] } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "4AS:kernel-0:2.6.9-89.33.1.EL.i686", "4AS:kernel-0:2.6.9-89.33.1.EL.ia64", "4AS:kernel-0:2.6.9-89.33.1.EL.ppc64", "4AS:kernel-0:2.6.9-89.33.1.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.33.1.EL.s390", "4AS:kernel-0:2.6.9-89.33.1.EL.s390x", "4AS:kernel-0:2.6.9-89.33.1.EL.src", "4AS:kernel-0:2.6.9-89.33.1.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.33.1.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.33.1.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.33.1.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.33.1.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.33.1.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.33.1.EL.i686", "4AS:kernel-devel-0:2.6.9-89.33.1.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.33.1.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.33.1.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.33.1.EL.s390", "4AS:kernel-devel-0:2.6.9-89.33.1.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.33.1.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.33.1.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.33.1.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.33.1.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.33.1.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.33.1.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.33.1.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.33.1.EL.i686", "4AS:kernel-smp-0:2.6.9-89.33.1.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.33.1.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.33.1.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.33.1.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.33.1.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.33.1.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.33.1.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.33.1.EL.i686", "4Desktop:kernel-0:2.6.9-89.33.1.EL.ia64", "4Desktop:kernel-0:2.6.9-89.33.1.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.33.1.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.33.1.EL.s390", "4Desktop:kernel-0:2.6.9-89.33.1.EL.s390x", "4Desktop:kernel-0:2.6.9-89.33.1.EL.src", "4Desktop:kernel-0:2.6.9-89.33.1.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.33.1.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.33.1.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.33.1.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.33.1.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.33.1.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.33.1.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.33.1.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.33.1.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.33.1.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.33.1.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.33.1.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.33.1.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.33.1.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.33.1.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.33.1.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.33.1.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.33.1.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.33.1.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.33.1.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.33.1.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.33.1.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.33.1.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.33.1.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.33.1.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.33.1.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.33.1.EL.x86_64", "4ES:kernel-0:2.6.9-89.33.1.EL.i686", "4ES:kernel-0:2.6.9-89.33.1.EL.ia64", "4ES:kernel-0:2.6.9-89.33.1.EL.ppc64", "4ES:kernel-0:2.6.9-89.33.1.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.33.1.EL.s390", "4ES:kernel-0:2.6.9-89.33.1.EL.s390x", "4ES:kernel-0:2.6.9-89.33.1.EL.src", "4ES:kernel-0:2.6.9-89.33.1.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.33.1.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.33.1.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.33.1.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.33.1.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.33.1.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.33.1.EL.i686", "4ES:kernel-devel-0:2.6.9-89.33.1.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.33.1.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.33.1.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.33.1.EL.s390", "4ES:kernel-devel-0:2.6.9-89.33.1.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.33.1.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.33.1.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.33.1.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.33.1.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.33.1.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.33.1.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.33.1.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.33.1.EL.i686", "4ES:kernel-smp-0:2.6.9-89.33.1.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.33.1.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.33.1.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.33.1.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.33.1.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.33.1.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.33.1.EL.x86_64", "4WS:kernel-0:2.6.9-89.33.1.EL.i686", "4WS:kernel-0:2.6.9-89.33.1.EL.ia64", "4WS:kernel-0:2.6.9-89.33.1.EL.ppc64", "4WS:kernel-0:2.6.9-89.33.1.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.33.1.EL.s390", "4WS:kernel-0:2.6.9-89.33.1.EL.s390x", "4WS:kernel-0:2.6.9-89.33.1.EL.src", "4WS:kernel-0:2.6.9-89.33.1.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.33.1.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.33.1.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.33.1.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.33.1.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.33.1.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.33.1.EL.i686", "4WS:kernel-devel-0:2.6.9-89.33.1.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.33.1.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.33.1.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.33.1.EL.s390", "4WS:kernel-devel-0:2.6.9-89.33.1.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.33.1.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.33.1.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.33.1.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.33.1.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.33.1.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.33.1.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.33.1.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.33.1.EL.i686", "4WS:kernel-smp-0:2.6.9-89.33.1.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.33.1.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.33.1.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.33.1.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.33.1.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.33.1.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.33.1.EL.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: sctp: do not reset the packet during sctp_packet_config" }, { "acknowledgments": [ { "names": [ "Dan Rosenberg" ] } ], "cve": "CVE-2010-3442", "discovery_date": "2010-09-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "638478" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in the snd_ctl_new function in sound/core/control.c in the Linux kernel before 2.6.36-rc5-next-20100929 allow local users to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a crafted (1) SNDRV_CTL_IOCTL_ELEM_ADD or (2) SNDRV_CTL_IOCTL_ELEM_REPLACE ioctl call.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: prevent heap corruption in snd_ctl_new()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-89.33.1.EL.i686", "4AS:kernel-0:2.6.9-89.33.1.EL.ia64", "4AS:kernel-0:2.6.9-89.33.1.EL.ppc64", "4AS:kernel-0:2.6.9-89.33.1.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.33.1.EL.s390", "4AS:kernel-0:2.6.9-89.33.1.EL.s390x", "4AS:kernel-0:2.6.9-89.33.1.EL.src", "4AS:kernel-0:2.6.9-89.33.1.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.33.1.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.33.1.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.33.1.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.33.1.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.33.1.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.33.1.EL.i686", "4AS:kernel-devel-0:2.6.9-89.33.1.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.33.1.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.33.1.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.33.1.EL.s390", "4AS:kernel-devel-0:2.6.9-89.33.1.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.33.1.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.33.1.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.33.1.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.33.1.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.33.1.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.33.1.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.33.1.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.33.1.EL.i686", "4AS:kernel-smp-0:2.6.9-89.33.1.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.33.1.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.33.1.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.33.1.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.33.1.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.33.1.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.33.1.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.33.1.EL.i686", "4Desktop:kernel-0:2.6.9-89.33.1.EL.ia64", "4Desktop:kernel-0:2.6.9-89.33.1.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.33.1.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.33.1.EL.s390", "4Desktop:kernel-0:2.6.9-89.33.1.EL.s390x", "4Desktop:kernel-0:2.6.9-89.33.1.EL.src", "4Desktop:kernel-0:2.6.9-89.33.1.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.33.1.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.33.1.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.33.1.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.33.1.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.33.1.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.33.1.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.33.1.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.33.1.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.33.1.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.33.1.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.33.1.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.33.1.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.33.1.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.33.1.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.33.1.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.33.1.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.33.1.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.33.1.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.33.1.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.33.1.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.33.1.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.33.1.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.33.1.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.33.1.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.33.1.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.33.1.EL.x86_64", "4ES:kernel-0:2.6.9-89.33.1.EL.i686", "4ES:kernel-0:2.6.9-89.33.1.EL.ia64", "4ES:kernel-0:2.6.9-89.33.1.EL.ppc64", "4ES:kernel-0:2.6.9-89.33.1.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.33.1.EL.s390", "4ES:kernel-0:2.6.9-89.33.1.EL.s390x", "4ES:kernel-0:2.6.9-89.33.1.EL.src", "4ES:kernel-0:2.6.9-89.33.1.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.33.1.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.33.1.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.33.1.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.33.1.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.33.1.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.33.1.EL.i686", "4ES:kernel-devel-0:2.6.9-89.33.1.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.33.1.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.33.1.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.33.1.EL.s390", "4ES:kernel-devel-0:2.6.9-89.33.1.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.33.1.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.33.1.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.33.1.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.33.1.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.33.1.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.33.1.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.33.1.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.33.1.EL.i686", "4ES:kernel-smp-0:2.6.9-89.33.1.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.33.1.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.33.1.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.33.1.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.33.1.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.33.1.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.33.1.EL.x86_64", "4WS:kernel-0:2.6.9-89.33.1.EL.i686", "4WS:kernel-0:2.6.9-89.33.1.EL.ia64", "4WS:kernel-0:2.6.9-89.33.1.EL.ppc64", "4WS:kernel-0:2.6.9-89.33.1.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.33.1.EL.s390", "4WS:kernel-0:2.6.9-89.33.1.EL.s390x", "4WS:kernel-0:2.6.9-89.33.1.EL.src", "4WS:kernel-0:2.6.9-89.33.1.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.33.1.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.33.1.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.33.1.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.33.1.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.33.1.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.33.1.EL.i686", "4WS:kernel-devel-0:2.6.9-89.33.1.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.33.1.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.33.1.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.33.1.EL.s390", "4WS:kernel-devel-0:2.6.9-89.33.1.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.33.1.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.33.1.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.33.1.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.33.1.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.33.1.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.33.1.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.33.1.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.33.1.EL.i686", "4WS:kernel-smp-0:2.6.9-89.33.1.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.33.1.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.33.1.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.33.1.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.33.1.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.33.1.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.33.1.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3442" }, { "category": "external", "summary": "RHBZ#638478", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=638478" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3442", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3442" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3442", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3442" } ], "release_date": "2010-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-12-01T22:21:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "4AS:kernel-0:2.6.9-89.33.1.EL.i686", "4AS:kernel-0:2.6.9-89.33.1.EL.ia64", "4AS:kernel-0:2.6.9-89.33.1.EL.ppc64", "4AS:kernel-0:2.6.9-89.33.1.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.33.1.EL.s390", "4AS:kernel-0:2.6.9-89.33.1.EL.s390x", "4AS:kernel-0:2.6.9-89.33.1.EL.src", "4AS:kernel-0:2.6.9-89.33.1.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.33.1.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.33.1.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.33.1.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.33.1.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.33.1.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.33.1.EL.i686", "4AS:kernel-devel-0:2.6.9-89.33.1.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.33.1.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.33.1.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.33.1.EL.s390", "4AS:kernel-devel-0:2.6.9-89.33.1.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.33.1.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.33.1.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.33.1.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.33.1.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.33.1.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.33.1.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.33.1.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.33.1.EL.i686", "4AS:kernel-smp-0:2.6.9-89.33.1.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.33.1.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.33.1.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.33.1.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.33.1.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.33.1.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.33.1.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.33.1.EL.i686", "4Desktop:kernel-0:2.6.9-89.33.1.EL.ia64", "4Desktop:kernel-0:2.6.9-89.33.1.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.33.1.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.33.1.EL.s390", "4Desktop:kernel-0:2.6.9-89.33.1.EL.s390x", "4Desktop:kernel-0:2.6.9-89.33.1.EL.src", "4Desktop:kernel-0:2.6.9-89.33.1.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.33.1.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.33.1.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.33.1.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.33.1.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.33.1.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.33.1.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.33.1.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.33.1.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.33.1.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.33.1.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.33.1.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.33.1.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.33.1.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.33.1.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.33.1.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.33.1.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.33.1.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.33.1.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.33.1.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.33.1.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.33.1.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.33.1.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.33.1.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.33.1.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.33.1.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.33.1.EL.x86_64", "4ES:kernel-0:2.6.9-89.33.1.EL.i686", "4ES:kernel-0:2.6.9-89.33.1.EL.ia64", "4ES:kernel-0:2.6.9-89.33.1.EL.ppc64", "4ES:kernel-0:2.6.9-89.33.1.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.33.1.EL.s390", "4ES:kernel-0:2.6.9-89.33.1.EL.s390x", "4ES:kernel-0:2.6.9-89.33.1.EL.src", "4ES:kernel-0:2.6.9-89.33.1.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.33.1.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.33.1.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.33.1.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.33.1.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.33.1.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.33.1.EL.i686", "4ES:kernel-devel-0:2.6.9-89.33.1.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.33.1.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.33.1.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.33.1.EL.s390", "4ES:kernel-devel-0:2.6.9-89.33.1.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.33.1.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.33.1.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.33.1.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.33.1.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.33.1.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.33.1.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.33.1.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.33.1.EL.i686", "4ES:kernel-smp-0:2.6.9-89.33.1.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.33.1.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.33.1.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.33.1.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.33.1.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.33.1.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.33.1.EL.x86_64", "4WS:kernel-0:2.6.9-89.33.1.EL.i686", "4WS:kernel-0:2.6.9-89.33.1.EL.ia64", "4WS:kernel-0:2.6.9-89.33.1.EL.ppc64", "4WS:kernel-0:2.6.9-89.33.1.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.33.1.EL.s390", "4WS:kernel-0:2.6.9-89.33.1.EL.s390x", "4WS:kernel-0:2.6.9-89.33.1.EL.src", "4WS:kernel-0:2.6.9-89.33.1.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.33.1.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.33.1.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.33.1.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.33.1.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.33.1.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.33.1.EL.i686", "4WS:kernel-devel-0:2.6.9-89.33.1.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.33.1.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.33.1.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.33.1.EL.s390", "4WS:kernel-devel-0:2.6.9-89.33.1.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.33.1.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.33.1.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.33.1.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.33.1.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.33.1.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.33.1.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.33.1.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.33.1.EL.i686", "4WS:kernel-smp-0:2.6.9-89.33.1.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.33.1.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.33.1.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.33.1.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.33.1.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.33.1.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.33.1.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0936" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "4AS:kernel-0:2.6.9-89.33.1.EL.i686", "4AS:kernel-0:2.6.9-89.33.1.EL.ia64", "4AS:kernel-0:2.6.9-89.33.1.EL.ppc64", "4AS:kernel-0:2.6.9-89.33.1.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.33.1.EL.s390", "4AS:kernel-0:2.6.9-89.33.1.EL.s390x", "4AS:kernel-0:2.6.9-89.33.1.EL.src", "4AS:kernel-0:2.6.9-89.33.1.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.33.1.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.33.1.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.33.1.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.33.1.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.33.1.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.33.1.EL.i686", "4AS:kernel-devel-0:2.6.9-89.33.1.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.33.1.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.33.1.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.33.1.EL.s390", "4AS:kernel-devel-0:2.6.9-89.33.1.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.33.1.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.33.1.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.33.1.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.33.1.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.33.1.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.33.1.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.33.1.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.33.1.EL.i686", "4AS:kernel-smp-0:2.6.9-89.33.1.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.33.1.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.33.1.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.33.1.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.33.1.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.33.1.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.33.1.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.33.1.EL.i686", "4Desktop:kernel-0:2.6.9-89.33.1.EL.ia64", "4Desktop:kernel-0:2.6.9-89.33.1.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.33.1.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.33.1.EL.s390", "4Desktop:kernel-0:2.6.9-89.33.1.EL.s390x", "4Desktop:kernel-0:2.6.9-89.33.1.EL.src", "4Desktop:kernel-0:2.6.9-89.33.1.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.33.1.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.33.1.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.33.1.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.33.1.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.33.1.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.33.1.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.33.1.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.33.1.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.33.1.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.33.1.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.33.1.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.33.1.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.33.1.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.33.1.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.33.1.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.33.1.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.33.1.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.33.1.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.33.1.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.33.1.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.33.1.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.33.1.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.33.1.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.33.1.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.33.1.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.33.1.EL.x86_64", "4ES:kernel-0:2.6.9-89.33.1.EL.i686", "4ES:kernel-0:2.6.9-89.33.1.EL.ia64", "4ES:kernel-0:2.6.9-89.33.1.EL.ppc64", "4ES:kernel-0:2.6.9-89.33.1.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.33.1.EL.s390", "4ES:kernel-0:2.6.9-89.33.1.EL.s390x", "4ES:kernel-0:2.6.9-89.33.1.EL.src", "4ES:kernel-0:2.6.9-89.33.1.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.33.1.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.33.1.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.33.1.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.33.1.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.33.1.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.33.1.EL.i686", "4ES:kernel-devel-0:2.6.9-89.33.1.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.33.1.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.33.1.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.33.1.EL.s390", "4ES:kernel-devel-0:2.6.9-89.33.1.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.33.1.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.33.1.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.33.1.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.33.1.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.33.1.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.33.1.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.33.1.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.33.1.EL.i686", "4ES:kernel-smp-0:2.6.9-89.33.1.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.33.1.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.33.1.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.33.1.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.33.1.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.33.1.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.33.1.EL.x86_64", "4WS:kernel-0:2.6.9-89.33.1.EL.i686", "4WS:kernel-0:2.6.9-89.33.1.EL.ia64", "4WS:kernel-0:2.6.9-89.33.1.EL.ppc64", "4WS:kernel-0:2.6.9-89.33.1.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.33.1.EL.s390", "4WS:kernel-0:2.6.9-89.33.1.EL.s390x", "4WS:kernel-0:2.6.9-89.33.1.EL.src", "4WS:kernel-0:2.6.9-89.33.1.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.33.1.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.33.1.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.33.1.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.33.1.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.33.1.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.33.1.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.33.1.EL.i686", "4WS:kernel-devel-0:2.6.9-89.33.1.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.33.1.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.33.1.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.33.1.EL.s390", "4WS:kernel-devel-0:2.6.9-89.33.1.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.33.1.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.33.1.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.33.1.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.33.1.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.33.1.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.33.1.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.33.1.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.33.1.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.33.1.EL.i686", "4WS:kernel-smp-0:2.6.9-89.33.1.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.33.1.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.33.1.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.33.1.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.33.1.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.33.1.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.33.1.EL.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: prevent heap corruption in snd_ctl_new()" } ] }
ghsa-3x4p-qf5f-hhw9
Vulnerability from github
Published
2022-05-13 01:24
Modified
2022-05-13 01:24
VLAI Severity ?
Details
Multiple integer overflows in the snd_ctl_new function in sound/core/control.c in the Linux kernel before 2.6.36-rc5-next-20100929 allow local users to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a crafted (1) SNDRV_CTL_IOCTL_ELEM_ADD or (2) SNDRV_CTL_IOCTL_ELEM_REPLACE ioctl call.
{ "affected": [], "aliases": [ "CVE-2010-3442" ], "database_specific": { "cwe_ids": [ "CWE-190" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2010-10-04T21:00:00Z", "severity": "MODERATE" }, "details": "Multiple integer overflows in the snd_ctl_new function in sound/core/control.c in the Linux kernel before 2.6.36-rc5-next-20100929 allow local users to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a crafted (1) SNDRV_CTL_IOCTL_ELEM_ADD or (2) SNDRV_CTL_IOCTL_ELEM_REPLACE ioctl call.", "id": "GHSA-3x4p-qf5f-hhw9", "modified": "2022-05-13T01:24:11Z", "published": "2022-05-13T01:24:11Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3442" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=638478" }, { "type": "WEB", "url": "http://git.kernel.org/?p=linux/kernel/git/tiwai/sound-2.6.git%3Ba=commit%3Bh=5591bf07225523600450edd9e6ad258bb877b779" }, { "type": "WEB", "url": "http://git.kernel.org/?p=linux/kernel/git/tiwai/sound-2.6.git;a=commit;h=5591bf07225523600450edd9e6ad258bb877b779" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/42400" }, { "type": "WEB", "url": "http://secunia.com/advisories/42745" }, { "type": "WEB", "url": "http://secunia.com/advisories/42778" }, { "type": "WEB", "url": "http://secunia.com/advisories/42789" }, { "type": "WEB", "url": "http://secunia.com/advisories/42801" }, { "type": "WEB", "url": "http://secunia.com/advisories/43291" }, { "type": "WEB", "url": "http://secunia.com/advisories/46397" }, { "type": "WEB", "url": "http://www.debian.org/security/2010/dsa-2126" }, { "type": "WEB", "url": "http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.36-rc5-next-20100928.bz2" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:257" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2010/09/29/2" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2010/09/29/3" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2010/09/29/4" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2010/09/29/9" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2010-0842.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2010-0936.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2010-0958.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2011-0004.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/43787" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-1000-1" }, { "type": "WEB", "url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2010/3113" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2010/3321" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2011/0012" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2011/0024" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2011/0298" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2011/0375" } ], "schema_version": "1.4.0", "severity": [] }
gsd-2010-3442
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
Multiple integer overflows in the snd_ctl_new function in sound/core/control.c in the Linux kernel before 2.6.36-rc5-next-20100929 allow local users to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a crafted (1) SNDRV_CTL_IOCTL_ELEM_ADD or (2) SNDRV_CTL_IOCTL_ELEM_REPLACE ioctl call.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2010-3442", "description": "Multiple integer overflows in the snd_ctl_new function in sound/core/control.c in the Linux kernel before 2.6.36-rc5-next-20100929 allow local users to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a crafted (1) SNDRV_CTL_IOCTL_ELEM_ADD or (2) SNDRV_CTL_IOCTL_ELEM_REPLACE ioctl call.", "id": "GSD-2010-3442", "references": [ "https://www.suse.com/security/cve/CVE-2010-3442.html", "https://www.debian.org/security/2010/dsa-2126", "https://access.redhat.com/errata/RHSA-2011:0004", "https://access.redhat.com/errata/RHSA-2010:0958", "https://access.redhat.com/errata/RHSA-2010:0936", "https://access.redhat.com/errata/RHSA-2010:0842", "https://linux.oracle.com/cve/CVE-2010-3442.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2010-3442" ], "details": "Multiple integer overflows in the snd_ctl_new function in sound/core/control.c in the Linux kernel before 2.6.36-rc5-next-20100929 allow local users to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a crafted (1) SNDRV_CTL_IOCTL_ELEM_ADD or (2) SNDRV_CTL_IOCTL_ELEM_REPLACE ioctl call.", "id": "GSD-2010-3442", "modified": "2023-12-13T01:21:34.677898Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2010-3442", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_affected": "=", "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple integer overflows in the snd_ctl_new function in sound/core/control.c in the Linux kernel before 2.6.36-rc5-next-20100929 allow local users to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a crafted (1) SNDRV_CTL_IOCTL_ELEM_ADD or (2) SNDRV_CTL_IOCTL_ELEM_REPLACE ioctl call." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html" }, { "name": "http://www.ubuntu.com/usn/USN-1000-1", "refsource": "MISC", "url": "http://www.ubuntu.com/usn/USN-1000-1" }, { "name": "http://www.vupen.com/english/advisories/2011/0298", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2011/0298" }, { "name": "http://www.redhat.com/support/errata/RHSA-2010-0842.html", "refsource": "MISC", "url": "http://www.redhat.com/support/errata/RHSA-2010-0842.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html" }, { "name": "http://secunia.com/advisories/42778", "refsource": "MISC", "url": "http://secunia.com/advisories/42778" }, { "name": "http://secunia.com/advisories/42801", "refsource": "MISC", "url": "http://secunia.com/advisories/42801" }, { "name": "http://www.debian.org/security/2010/dsa-2126", "refsource": "MISC", "url": "http://www.debian.org/security/2010/dsa-2126" }, { "name": "http://www.vupen.com/english/advisories/2011/0012", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2011/0012" }, { "name": "http://git.kernel.org/?p=linux/kernel/git/tiwai/sound-2.6.git%3Ba=commit%3Bh=5591bf07225523600450edd9e6ad258bb877b779", "refsource": "MISC", "url": "http://git.kernel.org/?p=linux/kernel/git/tiwai/sound-2.6.git%3Ba=commit%3Bh=5591bf07225523600450edd9e6ad258bb877b779" }, { "name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html", "refsource": "MISC", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html" }, { "name": "http://secunia.com/advisories/42400", "refsource": "MISC", "url": "http://secunia.com/advisories/42400" }, { "name": "http://secunia.com/advisories/42745", "refsource": "MISC", "url": "http://secunia.com/advisories/42745" }, { "name": "http://secunia.com/advisories/42789", "refsource": "MISC", "url": "http://secunia.com/advisories/42789" }, { "name": "http://secunia.com/advisories/43291", "refsource": "MISC", "url": "http://secunia.com/advisories/43291" }, { "name": "http://secunia.com/advisories/46397", "refsource": "MISC", "url": "http://secunia.com/advisories/46397" }, { "name": "http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.36-rc5-next-20100928.bz2", "refsource": "MISC", "url": "http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.36-rc5-next-20100928.bz2" }, { "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:257", "refsource": "MISC", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:257" }, { "name": "http://www.openwall.com/lists/oss-security/2010/09/29/2", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2010/09/29/2" }, { "name": "http://www.openwall.com/lists/oss-security/2010/09/29/3", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2010/09/29/3" }, { "name": "http://www.openwall.com/lists/oss-security/2010/09/29/4", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2010/09/29/4" }, { "name": "http://www.openwall.com/lists/oss-security/2010/09/29/9", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2010/09/29/9" }, { "name": "http://www.redhat.com/support/errata/RHSA-2010-0936.html", "refsource": "MISC", "url": "http://www.redhat.com/support/errata/RHSA-2010-0936.html" }, { "name": "http://www.redhat.com/support/errata/RHSA-2010-0958.html", "refsource": "MISC", "url": "http://www.redhat.com/support/errata/RHSA-2010-0958.html" }, { "name": "http://www.redhat.com/support/errata/RHSA-2011-0004.html", "refsource": "MISC", "url": "http://www.redhat.com/support/errata/RHSA-2011-0004.html" }, { "name": "http://www.securityfocus.com/archive/1/520102/100/0/threaded", "refsource": "MISC", "url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded" }, { "name": "http://www.securityfocus.com/bid/43787", "refsource": "MISC", "url": "http://www.securityfocus.com/bid/43787" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html", "refsource": "MISC", "url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html" }, { "name": "http://www.vupen.com/english/advisories/2010/3113", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2010/3113" }, { "name": "http://www.vupen.com/english/advisories/2010/3321", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2010/3321" }, { "name": "http://www.vupen.com/english/advisories/2011/0024", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2011/0024" }, { "name": "http://www.vupen.com/english/advisories/2011/0375", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2011/0375" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=638478", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=638478" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.6.36", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2010-3442" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Multiple integer overflows in the snd_ctl_new function in sound/core/control.c in the Linux kernel before 2.6.36-rc5-next-20100929 allow local users to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a crafted (1) SNDRV_CTL_IOCTL_ELEM_ADD or (2) SNDRV_CTL_IOCTL_ELEM_REPLACE ioctl call." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-190" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20100929 Re: CVE request - kernel: prevent heap corruption in snd_ctl_new()", "refsource": "MLIST", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2010/09/29/9" }, { "name": "[oss-security] 20100929 Re: CVE request - kernel: prevent heap corruption in snd_ctl_new()", "refsource": "MLIST", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2010/09/29/4" }, { "name": "[oss-security] 20100929 CVE request - kernel: prevent heap corruption in snd_ctl_new()", "refsource": "MLIST", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2010/09/29/2" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=638478", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=638478" }, { "name": "[oss-security] 20100929 Re: CVE request - kernel: prevent heap corruption in snd_ctl_new()", "refsource": "MLIST", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2010/09/29/3" }, { "name": "http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.36-rc5-next-20100928.bz2", "refsource": "CONFIRM", "tags": [ "Broken Link" ], "url": "http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.36-rc5-next-20100928.bz2" }, { "name": "42400", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/42400" }, { "name": "RHSA-2010:0936", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0936.html" }, { "name": "43787", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/43787" }, { "name": "ADV-2010-3113", "refsource": "VUPEN", "tags": [ "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/3113" }, { "name": "RHSA-2010:0842", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0842.html" }, { "name": "USN-1000-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-1000-1" }, { "name": "42745", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/42745" }, { "name": "FEDORA-2010-18983", "refsource": "FEDORA", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html" }, { "name": "ADV-2010-3321", "refsource": "VUPEN", "tags": [ "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/3321" }, { "name": "RHSA-2011:0004", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0004.html" }, { "name": "RHSA-2010:0958", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0958.html" }, { "name": "SUSE-SA:2011:002", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html" }, { "name": "DSA-2126", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2010/dsa-2126" }, { "name": "SUSE-SA:2011:001", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html" }, { "name": "MDVSA-2010:257", "refsource": "MANDRIVA", "tags": [ "Third Party Advisory" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:257" }, { "name": "ADV-2011-0012", "refsource": "VUPEN", "tags": [ "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0012" }, { "name": "42801", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/42801" }, { "name": "42778", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/42778" }, { "name": "ADV-2011-0024", "refsource": "VUPEN", "tags": [ "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0024" }, { "name": "42789", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/42789" }, { "name": "SUSE-SA:2010:060", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html" }, { "name": "43291", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/43291" }, { "name": "SUSE-SA:2011:008", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html" }, { "name": "ADV-2011-0375", "refsource": "VUPEN", "tags": [ "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0375" }, { "name": "ADV-2011-0298", "refsource": "VUPEN", "tags": [ "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0298" }, { "name": "SUSE-SA:2011:007", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html" }, { "name": "46397", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/46397" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html" }, { "name": "20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console", "refsource": "BUGTRAQ", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded" }, { "name": "http://git.kernel.org/?p=linux/kernel/git/tiwai/sound-2.6.git%3Ba=commit%3Bh=5591bf07225523600450edd9e6ad258bb877b779", "refsource": "MISC", "tags": [], "url": "http://git.kernel.org/?p=linux/kernel/git/tiwai/sound-2.6.git%3Ba=commit%3Bh=5591bf07225523600450edd9e6ad258bb877b779" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.7, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": true } }, "lastModifiedDate": "2023-02-13T04:24Z", "publishedDate": "2010-10-04T21:00Z" } } }
fkie_cve-2010-3442
Vulnerability from fkie_nvd
Published
2010-10-04 21:00
Modified
2025-04-11 00:51
Severity ?
Summary
Multiple integer overflows in the snd_ctl_new function in sound/core/control.c in the Linux kernel before 2.6.36-rc5-next-20100929 allow local users to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a crafted (1) SNDRV_CTL_IOCTL_ELEM_ADD or (2) SNDRV_CTL_IOCTL_ELEM_REPLACE ioctl call.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://git.kernel.org/?p=linux/kernel/git/tiwai/sound-2.6.git%3Ba=commit%3Bh=5591bf07225523600450edd9e6ad258bb877b779 | ||
secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html | Third Party Advisory | |
secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html | Mailing List, Third Party Advisory | |
secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html | Mailing List, Third Party Advisory | |
secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html | Mailing List, Third Party Advisory | |
secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html | Mailing List, Third Party Advisory | |
secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html | Mailing List, Third Party Advisory | |
secalert@redhat.com | http://secunia.com/advisories/42400 | Third Party Advisory | |
secalert@redhat.com | http://secunia.com/advisories/42745 | Third Party Advisory | |
secalert@redhat.com | http://secunia.com/advisories/42778 | Third Party Advisory | |
secalert@redhat.com | http://secunia.com/advisories/42789 | Third Party Advisory | |
secalert@redhat.com | http://secunia.com/advisories/42801 | Third Party Advisory | |
secalert@redhat.com | http://secunia.com/advisories/43291 | Third Party Advisory | |
secalert@redhat.com | http://secunia.com/advisories/46397 | Third Party Advisory | |
secalert@redhat.com | http://www.debian.org/security/2010/dsa-2126 | Third Party Advisory | |
secalert@redhat.com | http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.36-rc5-next-20100928.bz2 | Broken Link | |
secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDVSA-2010:257 | Third Party Advisory | |
secalert@redhat.com | http://www.openwall.com/lists/oss-security/2010/09/29/2 | Mailing List, Patch, Third Party Advisory | |
secalert@redhat.com | http://www.openwall.com/lists/oss-security/2010/09/29/3 | Mailing List, Patch, Third Party Advisory | |
secalert@redhat.com | http://www.openwall.com/lists/oss-security/2010/09/29/4 | Mailing List, Patch, Third Party Advisory | |
secalert@redhat.com | http://www.openwall.com/lists/oss-security/2010/09/29/9 | Mailing List, Patch, Third Party Advisory | |
secalert@redhat.com | http://www.redhat.com/support/errata/RHSA-2010-0842.html | Third Party Advisory | |
secalert@redhat.com | http://www.redhat.com/support/errata/RHSA-2010-0936.html | Third Party Advisory | |
secalert@redhat.com | http://www.redhat.com/support/errata/RHSA-2010-0958.html | Third Party Advisory | |
secalert@redhat.com | http://www.redhat.com/support/errata/RHSA-2011-0004.html | Third Party Advisory | |
secalert@redhat.com | http://www.securityfocus.com/archive/1/520102/100/0/threaded | Third Party Advisory, VDB Entry | |
secalert@redhat.com | http://www.securityfocus.com/bid/43787 | Third Party Advisory, VDB Entry | |
secalert@redhat.com | http://www.ubuntu.com/usn/USN-1000-1 | Third Party Advisory | |
secalert@redhat.com | http://www.vmware.com/security/advisories/VMSA-2011-0012.html | Third Party Advisory | |
secalert@redhat.com | http://www.vupen.com/english/advisories/2010/3113 | Third Party Advisory | |
secalert@redhat.com | http://www.vupen.com/english/advisories/2010/3321 | Third Party Advisory | |
secalert@redhat.com | http://www.vupen.com/english/advisories/2011/0012 | Third Party Advisory | |
secalert@redhat.com | http://www.vupen.com/english/advisories/2011/0024 | Third Party Advisory | |
secalert@redhat.com | http://www.vupen.com/english/advisories/2011/0298 | Third Party Advisory | |
secalert@redhat.com | http://www.vupen.com/english/advisories/2011/0375 | Third Party Advisory | |
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=638478 | Issue Tracking, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://git.kernel.org/?p=linux/kernel/git/tiwai/sound-2.6.git%3Ba=commit%3Bh=5591bf07225523600450edd9e6ad258bb877b779 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/42400 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/42745 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/42778 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/42789 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/42801 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/43291 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/46397 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2010/dsa-2126 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.36-rc5-next-20100928.bz2 | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2010:257 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2010/09/29/2 | Mailing List, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2010/09/29/3 | Mailing List, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2010/09/29/4 | Mailing List, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2010/09/29/9 | Mailing List, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2010-0842.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2010-0936.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2010-0958.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2011-0004.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/520102/100/0/threaded | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/43787 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-1000-1 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vmware.com/security/advisories/VMSA-2011-0012.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/3113 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/3321 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2011/0012 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2011/0024 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2011/0298 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2011/0375 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=638478 | Issue Tracking, Patch, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
linux | linux_kernel | * | |
linux | linux_kernel | 2.6.36 | |
linux | linux_kernel | 2.6.36 | |
linux | linux_kernel | 2.6.36 | |
linux | linux_kernel | 2.6.36 | |
linux | linux_kernel | 2.6.36 | |
fedoraproject | fedora | 13 | |
opensuse | opensuse | 11.2 | |
opensuse | opensuse | 11.3 | |
suse | linux_enterprise_desktop | 10 | |
suse | linux_enterprise_real_time_extension | 11 | |
suse | linux_enterprise_server | 9 | |
suse | linux_enterprise_server | 10 | |
suse | linux_enterprise_software_development_kit | 10 | |
debian | debian_linux | 5.0 | |
canonical | ubuntu_linux | 6.06 | |
canonical | ubuntu_linux | 8.04 | |
canonical | ubuntu_linux | 9.04 | |
canonical | ubuntu_linux | 9.10 | |
canonical | ubuntu_linux | 10.04 | |
canonical | ubuntu_linux | 10.10 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "C8DCE5E2-B055-4F05-8F0F-F19D1B7BA8D7", "versionEndExcluding": "2.6.36", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*", "matchCriteriaId": "D4407EF9-4ECF-408F-9ECB-0705E3FB65D5", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*", "matchCriteriaId": "DBE26099-6D2C-4FAF-B15C-CBF985D59171", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*", "matchCriteriaId": "F2C193FF-3723-4BE9-8787-DED7D455FA8F", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*", "matchCriteriaId": "F874FE6A-968D-47E1-900A-E154E41EDAF8", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*", "matchCriteriaId": "14B7B8AE-CE83-4F0E-9138-6F165D97C19F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*", "matchCriteriaId": "A2D59BD0-43DE-4E58-A057-640AB98359A6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*", "matchCriteriaId": "A01C8B7E-EB19-40EA-B1D2-9AE5EA536C95", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*", "matchCriteriaId": "5646FDE9-CF21-46A9-B89D-F5BBDB4249AF", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*", "matchCriteriaId": "1E496249-23A8-42FC-A109-634A54B5600F", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*", "matchCriteriaId": "640FB29C-1A84-41E1-86DE-B542EA0EF153", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*", "matchCriteriaId": "4CD2D897-E321-4CED-92E0-11A98B52053C", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*", "matchCriteriaId": "25CBACD3-AFB7-410D-927F-0C1FF477D396", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*", "matchCriteriaId": "3DB8A616-865B-4E70-BA2E-BE5F0BA7A351", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "8C757774-08E7-40AA-B532-6F705C8F7639", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "matchCriteriaId": "454A5D17-B171-4F1F-9E0B-F18D1E5CA9FD", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "matchCriteriaId": "7EBFE35C-E243-43D1-883D-4398D71763CC", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "matchCriteriaId": "A5D026D0-EF78-438D-BEDD-FC8571F3ACEB", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "matchCriteriaId": "A2BCB73E-27BB-4878-AD9C-90C4F20C25A0", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "matchCriteriaId": "01EDA41C-6B2E-49AF-B503-EB3882265C11", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*", "matchCriteriaId": "87614B58-24AB-49FB-9C84-E8DDBA16353B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple integer overflows in the snd_ctl_new function in sound/core/control.c in the Linux kernel before 2.6.36-rc5-next-20100929 allow local users to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a crafted (1) SNDRV_CTL_IOCTL_ELEM_ADD or (2) SNDRV_CTL_IOCTL_ELEM_REPLACE ioctl call." }, { "lang": "es", "value": "M\u00faltiples desbordamientos de entero en la funci\u00f3n snd_ctl_new de sound/core/control.c en el kernel de Linux en versiones anteriores a la 2.6.36-rc5-next-20100929. Permiten a usuarios locales provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de la memoria din\u00e1mica) o posiblemente provocar otros impactos sin especificar a trav\u00e9s de una llamada ioctl (1) SNDRV_CTL_IOCTL_ELEM_ADD o (2) SNDRV_CTL_IOCTL_ELEM_REPLACE ioctl call." } ], "id": "CVE-2010-3442", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.7, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-10-04T21:00:04.923", "references": [ { "source": "secalert@redhat.com", "url": "http://git.kernel.org/?p=linux/kernel/git/tiwai/sound-2.6.git%3Ba=commit%3Bh=5591bf07225523600450edd9e6ad258bb877b779" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/42400" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/42745" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/42778" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/42789" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/42801" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/43291" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/46397" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2010/dsa-2126" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.36-rc5-next-20100928.bz2" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:257" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2010/09/29/2" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2010/09/29/3" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2010/09/29/4" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2010/09/29/9" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0842.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0936.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0958.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0004.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/43787" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-1000-1" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/3113" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/3321" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0012" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0024" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0298" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0375" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=638478" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://git.kernel.org/?p=linux/kernel/git/tiwai/sound-2.6.git%3Ba=commit%3Bh=5591bf07225523600450edd9e6ad258bb877b779" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/42400" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/42745" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/42778" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/42789" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/42801" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/43291" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/46397" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2010/dsa-2126" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.36-rc5-next-20100928.bz2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:257" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2010/09/29/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2010/09/29/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2010/09/29/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2010/09/29/9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0842.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0936.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0958.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0004.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/43787" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-1000-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/3113" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/3321" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0012" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0024" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0298" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0375" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=638478" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-190" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…