Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2012-4542 (GCVE-0-2012-4542)
Vulnerability from cvelistv5 – Published: 2013-02-28 19:00 – Updated: 2024-08-06 20:42- n/a
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T20:42:54.133Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "RHSA-2013:0496",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-0496.html"
},
{
"name": "RHSA-2013:0882",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-0882.html"
},
{
"name": "RHSA-2013:0928",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-0928.html"
},
{
"name": "[linux-kernel] 20130124 [PATCH 00/13] Corrections and customization of the SG_IO command whitelist (CVE-2012-4542)",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://marc.info/?l=linux-kernel\u0026m=135903967015813\u0026w=2"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=875360"
},
{
"name": "[linux-kernel] 20130124 [PATCH 04/13] sg_io: resolve conflicts between commands assigned to multiple classes (CVE-2012-4542)",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://marc.info/?l=linux-kernel\u0026m=135904012416042\u0026w=2"
},
{
"name": "RHSA-2013:0579",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-0579.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://oss.oracle.com/git/?p=redpatch.git%3Ba=commit%3Bh=76a274e17114abf1a77de6b651424648ce9e10c8"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2013-01-24T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "block/scsi_ioctl.c in the Linux kernel through 3.8 does not properly consider the SCSI device class during authorization of SCSI commands, which allows local users to bypass intended access restrictions via an SG_IO ioctl call that leverages overlapping opcodes."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2013-03-08T10:00:00.000Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "RHSA-2013:0496",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-0496.html"
},
{
"name": "RHSA-2013:0882",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-0882.html"
},
{
"name": "RHSA-2013:0928",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-0928.html"
},
{
"name": "[linux-kernel] 20130124 [PATCH 00/13] Corrections and customization of the SG_IO command whitelist (CVE-2012-4542)",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://marc.info/?l=linux-kernel\u0026m=135903967015813\u0026w=2"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=875360"
},
{
"name": "[linux-kernel] 20130124 [PATCH 04/13] sg_io: resolve conflicts between commands assigned to multiple classes (CVE-2012-4542)",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://marc.info/?l=linux-kernel\u0026m=135904012416042\u0026w=2"
},
{
"name": "RHSA-2013:0579",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-0579.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://oss.oracle.com/git/?p=redpatch.git%3Ba=commit%3Bh=76a274e17114abf1a77de6b651424648ce9e10c8"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2012-4542",
"datePublished": "2013-02-28T19:00:00.000Z",
"dateReserved": "2012-08-21T00:00:00.000Z",
"dateUpdated": "2024-08-06T20:42:54.133Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2012-4542\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2013-02-28T19:55:01.107\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"block/scsi_ioctl.c in the Linux kernel through 3.8 does not properly consider the SCSI device class during authorization of SCSI commands, which allows local users to bypass intended access restrictions via an SG_IO ioctl call that leverages overlapping opcodes.\"},{\"lang\":\"es\",\"value\":\"block / scsi_ioctl.c en el kernel de Linux a trav\u00e9s de v3,8 no tiene debidamente en cuenta la clase de dispositivo SCSI durante la autorizaci\u00f3n de los comandos SCSI, lo que permite a usuarios locales eludir restricciones de acceso destinados a trav\u00e9s de una llamada ioctl SG_IO que aprovecha c\u00f3digos de operaci\u00f3n que se superponen.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":4.6,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.9,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-264\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.8.0\",\"matchCriteriaId\":\"CDA7B92A-D47F-4E68-A019-4E7A673E53AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D30AEC07-3CBD-4F4F-9646-BEAA1D98750B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2AA8E68-691B-499C-AEDD-3C0BFFE70044\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"9440475B-5960-4066-A204-F30AAFC87846\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.0:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"53BCFBFB-6AF0-4525-8623-7633CC5E17DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.0:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"6ED4E86A-74F0-436A-BEB4-3F4EE93A5421\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.0:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF0365B0-8E16-4F30-BD92-5DD538CC8135\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.0:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"079505E8-2942-4C33-93D1-35ADA4C39E72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38989541-2360-4E0A-AE5A-3D6144AA6114\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E51646B-7A0E-40F3-B8C9-239C1DA81DD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42A8A507-F8E2-491C-A144-B2448A1DB26E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"901FC6F3-2C2A-4112-AE27-AB102BBE8DEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"203AD334-DB9F-41B0-A4D1-A6C158EF8C40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3611753-E440-410F-8250-600C996A4B8E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9739BB47-EEAF-42F1-A557-2AE2EA9526A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A95E3BB-0AFC-4C2E-B9BE-C975E902A266\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"482A6C9A-9B8E-4D1C-917A-F16370745E7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6D87357-63E0-41D0-9F02-1BCBF9A77E63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3765A2D6-2D78-4FB1-989E-D5106BFA3F5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.0.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F54257DB-7023-43C4-AC4D-9590B815CD92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.0.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61FF5FCD-A4A1-4803-AC53-320A4C838AF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.0.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F096553-064F-46A2-877B-F32F163A0F49\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.0.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0D762D1-E3AD-40EA-8D39-83EEB51B5E85\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.0.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6187D19-7148-4B87-AD7E-244FF9EE0FA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.0.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99AC64C2-E391-485C-9CD7-BA09C8FA5E63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.0.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CDA5E95-7805-441B-BEF7-4448EA45E964\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.0.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51561053-6C28-4F38-BC9B-3F7A7508EB72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.0.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"118F4A5B-C498-4FC3-BE28-50D18EBE4F22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.0.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD38EBE6-FE1A-4B55-9FB5-07952253B7A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.0.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A491E47-82AD-4055-9444-2EC0D6715326\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.0.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13C5FD16-23B6-467F-9438-5B554922F974\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.0.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C67235F-5B51-4BF7-89EC-4810F720246F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.0.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08405DEF-05F4-45F0-AC95-DBF914A36D93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.0.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A7B9C4B-4A41-4175-9F07-191C1EE98C1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.0.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B306E0A8-4D4A-4895-8128-A500D30A7E0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.0.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"295C839A-F34E-4853-A926-55EABC639412\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.0.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AFD5F49-7EF9-4CFE-95BD-8FD19B500B0A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.0.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00B3DDDD-B2F6-4753-BA38-65A24017857D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.0.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33FCD39E-F4BF-432D-9CF9-F195CF5844F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.0.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7308690-CB0D-4758-B80F-D2ADCD2A9D66\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.0.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"313A470B-8A2B-478A-82B5-B27D2718331C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.0.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83FF021E-07E3-41CC-AAE8-D99D7FF24B9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.0.35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F72412E3-8DA9-4CC9-A426-B534202ADBA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.0.36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCAA9D7A-3C3E-4C0B-9D38-EA80E68C2E46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.0.37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A9E3AE5-3FCF-4CBB-A30B-082BCFBFB0CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.0.38:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF715657-4C3A-4392-B85D-1BBF4DE45D89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.0.39:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B63C618-AC3D-4EF7-AFDF-27B9BF482B78\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.0.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C33DA5A9-5E40-4365-9602-82FB4DCD15B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.0.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFAFDB74-40BD-46FA-89AC-617EB2C7160B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.0.42:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF5F17DA-30A7-40CF-BD7C-CEDF06D64617\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.0.43:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71A276F5-BD9D-4C1B-90DF-9B0C15B6F7DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.0.44:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8F6EBEC-3C29-444B-BB85-6EF239B59EC1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DFFE5A6-6A67-4992-84A3-C0F05FACDEAD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.1:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"13BBD2A3-AE10-48B9-8776-4FB1CAC37D44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.1:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"B25680CC-8918-4F27-8D7E-A6579215450B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.1:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"92C48B4C-410C-4BA8-A28A-B2E928320FCC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.1:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB447523-855B-461E-8197-95169BE86EB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B155BBDF-6DF6-4FF5-9C41-D8A5266DCC67\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28476DEC-9630-4B40-9D4D-9BC151DC4CA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5646880A-2355-4BDD-89E7-825863A0311F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FF99148-267A-46F8-9927-A9082269BAF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A783C083-5D9C-48F9-B5A6-A97A9604FB19\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B817A24-03AC-46CD-BEFA-505457FD2A5D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.1.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51CF1BCE-090E-4B70-BA16-ACB74411293B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.1.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"187AAD67-10D7-4B57-B4C6-00443E246AF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.1.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F341CE88-C5BC-4CDD-9CB5-B6BAD7152E63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.1.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37ACE2A6-C229-4236-8E9F-235F008F3AA0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3220B70-917F-4F9F-8A3B-2BF581281E8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.2:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"99372D07-C06A-41FA-9843-6D57F99AB5AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.2:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B9DC110-D260-4DB4-B8B0-EF1D160ADA07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.2:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"6192FE84-4D53-40D4-AF61-78CE7136141A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.2:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"42FEF3CF-1302-45EB-89CC-3786FE4BAC1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.2:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE6A6B58-2C89-4DE4-BA57-78100818095C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.2:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D467F87-2F13-4D26-9A93-E0BA526FEA24\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE348F7B-02DE-47D5-8011-F83DA9426021\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E91594EA-F0A3-41B3-A9C6-F7864FC2F229\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E1ECCDB-0208-48F6-B44F-16CC0ECE3503\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FBA8B5DE-372E-47E0-A0F6-BE286D509CC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A1CA083-2CF8-45AE-9E15-1AA3A8352E3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19D69A49-5290-4C5F-8157-719AD58D253D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.2.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"290BD969-42E7-47B0-B21B-06DE4865432C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.2.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23A9E29E-DE78-4C73-9FBD-C2410F5FC8B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.2.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"018434C9-E75F-45CB-A169-DAB4B1D864D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.2.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC0AC68F-EC58-4C4F-8CBC-A59ECC00CCDE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.2.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C123C844-F6D7-471E-A62E-F756042FB1CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.2.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A11C38BB-7FA2-49B0-AAC9-83DB387A06DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.2.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61F3733C-E5F6-4855-B471-DF3FB823613B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.2.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DDCA75F-9A06-4457-9A45-38A38E7F7086\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.2.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AEA837E-7864-4003-8DB7-111ED710A7E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.2.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6FE471F-2D1F-4A1D-A197-7E46B75787E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.2.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDA9E6AB-58DC-4EC5-A25C-11F9D0B38BF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.2.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC6B8DB3-B05B-41A2-B091-342D66AAE8F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.2.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"958F0FF8-33EF-4A71-A0BD-572C85211DBA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.2.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FBA39F48-B02F-4C48-B304-DA9CCA055244\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.2.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FF841F3-48A7-41D7-9C45-A8170435A5EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.2.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF506916-A6DC-4B1E-90E5-959492AF55F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.2.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3CDAD1F-2C6A-48C0-8FAB-C2659373FA25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.2.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FFE4B22-C96A-43D0-B993-F51EDD9C5E0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.2.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F571CC8B-B212-4553-B463-1DB01D616E8A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.2.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84E3E151-D437-48ED-A529-731EEFF88567\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.2.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9E3EA3C-CCA5-4433-86E0-3D02C4757A0A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.2.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7AC4F7D-9FA6-4CF1-B2E9-70BF7D4D177C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.2.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CE3A80D-9648-43CC-8F99-D741ED6552BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.2.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8A98C03-A465-41B4-A551-A26FEC7FFD94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFB76697-1C2F-48C0-9B14-517EC053D4B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.3:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"BED88DFD-1DC5-4505-A441-44ECDEF0252D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.3:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBFD2ACD-728A-4082-BB6A-A1EF6E58E47D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.3:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"C31B0E51-F62D-4053-B04F-FC4D5BC373D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.3:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"A914303E-1CB6-4AAD-9F5F-DE5433C4E814\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.3:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"203BBA69-90B2-4C5E-8023-C14180742421\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.3:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DBFAB53-B889-4028-AC0E-7E165B152A18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.3:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE409AEC-F677-4DEF-8EB7-2C35809043CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"578EC12B-402F-4AD4-B8F8-C9B2CAB06891\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"877002ED-8097-4BB4-BB88-6FC6306C38B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76294CE3-D72C-41D5-9E0F-B693D0042699\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"916E97D4-1FAB-42F5-826B-653B1C0909A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33FD2217-C5D0-48C1-AD74-3527127FEF9C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E92971F-B629-4E0A-9A50-8B235F9704B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.3.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDD3A069-3829-4EE2-9D5A-29459F29D4C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.3.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4A0964C-CEB2-41D7-A69C-1599B05B6171\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F960FA6-F904-4A4E-B483-44C70090E9A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.4:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"261C1B41-C9E0-414F-8368-51C0C0B8AD38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.4:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CCA261D-2B97-492F-89A0-5F209A804350\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.4:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B1C0C68-9194-473F-BE5E-EC7F184899FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.4:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7A6AC9E-BEA6-44B0-B3B3-F0F94E32424A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.4:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"16038328-9399-4B85-B777-BA4757D02C9B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.4:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"16CA2757-FA8D-43D9-96E8-D3C0EB6E1DEF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.4:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8CB5481-5EAE-401E-BD7E-D3095CCA9E94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0F36FAC-141D-476D-84C5-A558C199F904\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51D64824-25F6-4761-BD6A-29038A143744\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E284C8A1-740F-454D-A774-99CD3A21B594\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C70D72AE-0CBF-4324-9935-57E28EC6279C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F674B06B-7E86-4E41-9126-8152D0DDABAE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.4.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7039B3EC-8B22-413E-B582-B4BEC6181241\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.4.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35CF1DD2-80B9-4476-8963-5C3EF52B33F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.4.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFB0B05B-A5CE-4B9C-AE7F-83062868D35B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.4.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D166A66E-7454-47EC-BB56-861A9AFEAFE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.4.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DA94F50-2A62-4300-BF4D-A342AAE35629\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.4.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"252D937B-50DC-444F-AE73-5FCF6203DF27\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.4.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6D8EE51-02C1-47BC-A92C-0A8ABEFD28FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.4.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F20A5D7-3B38-4911-861A-04C8310D5916\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.4.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D472DE3A-71D8-4F40-9DDE-85929A2B047D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.4.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2AED943-65A8-4FDB-BBD0-CCEF8682A48C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.4.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4640185-F3D8-4575-A71D-4C889A93DE2C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.4.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"144CCF7C-025E-4879-B2E7-ABB8E4390BE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.4.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6FAA052-0B2B-40CE-8C98-919B8D08A5ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.4.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B5A53DE-9C83-4A6B-96F3-23C03BF445D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.4.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"063EB879-CB05-4E33-AA90-9E43516839B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.4.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D25764F-4B02-4C65-954E-8C7D6632DE00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.4.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F31F5BF3-CD0A-465C-857F-273841BCD28A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.4.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF302C8A-079B-42B9-B455-CD9083BFA067\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.4.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"744999C0-33D3-4363-B3DB-E0D02CDD3918\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"962B0C45-AB29-4383-AC16-C6E8245D0FF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0EE126B-74B2-4F79-BFE1-3DC169F3F9B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"392075E0-A9C7-4B4A-90F9-7F1ADFF5EFA7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECC66968-06F0-4874-A95A-A292C36E45C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5FE986E6-1068-4E1B-8EAB-DF1EAF32B4E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.5.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"543E8536-1A8E-4E76-B89F-1B1F9F26FAB8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.5.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC2B45E3-31E1-4B46-85FA-3A84E75B8F84\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDB8CC75-D3EE-417C-A83D-CB6D666FE595\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09A072F1-7BEE-4236-ACBB-55DB8FEF4A03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E19D5A58-17D6-4502-A57A-70B2F84817A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D58BA035-1204-4DFA-98A1-12111FB6222E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A17F2E87-8EB8-476A-B5B5-9AE5CF53D9FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8CCC101-5852-4299-9B67-EA1B149D58C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8074D32-C252-4AD3-A579-1C5EDDD7014B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.6.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"962AA802-8179-4606-AAC0-9363BAEABC9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.6.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1286C858-D5A2-45F3-86D1-E50FE53FB23C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.6.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AC4A13E-F560-4D01-98A3-E2A2B82EB25B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.6.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"942C462A-5398-4BB9-A792-598682E1FEF2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.6.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B852F7E0-0282-483D-BB4D-18CB7A4F1392\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53ED9A31-99CC-41C8-8B72-5B2A9B49AA6C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFD646BC-62F7-47CF-B0BE-768F701F7D9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F43D418E-87C1-4C83-9FF1-4F45B4F452DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"680D0E00-F29A-487C-8770-8E7EAC672B7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DCA96A4-A836-4E94-A39C-3AD3EA1D9611\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.7.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"753C05E3-B603-4E36-B9BA-FAEDCBF62A7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E385C2E0-B9F1-4564-8E6D-56FD9E762405\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.7.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"041335D4-05E1-4004-9381-28AAD5994B47\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.7.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"370F2AE5-3DBC-46B9-AC70-F052C9229C00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.7.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A971BE3-259D-4494-BBC5-12793D92DB57\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.7.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E4719A6-FDEA-4714-A830-E23A52AE90BC\"}]}]}],\"references\":[{\"url\":\"http://marc.info/?l=linux-kernel\u0026m=135903967015813\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=linux-kernel\u0026m=135904012416042\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-0496.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-0579.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-0882.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-0928.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=875360\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://oss.oracle.com/git/?p=redpatch.git%3Ba=commit%3Bh=76a274e17114abf1a77de6b651424648ce9e10c8\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=linux-kernel\u0026m=135903967015813\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=linux-kernel\u0026m=135904012416042\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-0496.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-0579.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-0882.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-0928.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=875360\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oss.oracle.com/git/?p=redpatch.git%3Ba=commit%3Bh=76a274e17114abf1a77de6b651424648ce9e10c8\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
GHSA-JCFV-WJCF-PHJG
Vulnerability from github – Published: 2022-05-17 05:08 – Updated: 2022-05-17 05:08block/scsi_ioctl.c in the Linux kernel through 3.8 does not properly consider the SCSI device class during authorization of SCSI commands, which allows local users to bypass intended access restrictions via an SG_IO ioctl call that leverages overlapping opcodes.
{
"affected": [],
"aliases": [
"CVE-2012-4542"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2013-02-28T19:55:00Z",
"severity": "MODERATE"
},
"details": "block/scsi_ioctl.c in the Linux kernel through 3.8 does not properly consider the SCSI device class during authorization of SCSI commands, which allows local users to bypass intended access restrictions via an SG_IO ioctl call that leverages overlapping opcodes.",
"id": "GHSA-jcfv-wjcf-phjg",
"modified": "2022-05-17T05:08:37Z",
"published": "2022-05-17T05:08:37Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-4542"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=875360"
},
{
"type": "WEB",
"url": "https://oss.oracle.com/git/?p=redpatch.git%3Ba=commit%3Bh=76a274e17114abf1a77de6b651424648ce9e10c8"
},
{
"type": "WEB",
"url": "https://oss.oracle.com/git/?p=redpatch.git;a=commit;h=76a274e17114abf1a77de6b651424648ce9e10c8"
},
{
"type": "WEB",
"url": "http://marc.info/?l=linux-kernel\u0026m=135903967015813\u0026w=2"
},
{
"type": "WEB",
"url": "http://marc.info/?l=linux-kernel\u0026m=135904012416042\u0026w=2"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0496.html"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0579.html"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0882.html"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0928.html"
}
],
"schema_version": "1.4.0",
"severity": []
}
FKIE_CVE-2012-4542
Vulnerability from fkie_nvd - Published: 2013-02-28 19:55 - Updated: 2025-04-11 00:51{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CDA7B92A-D47F-4E68-A019-4E7A673E53AD",
"versionEndIncluding": "3.8.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "D30AEC07-3CBD-4F4F-9646-BEAA1D98750B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "C2AA8E68-691B-499C-AEDD-3C0BFFE70044",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0:rc3:*:*:*:*:*:*",
"matchCriteriaId": "9440475B-5960-4066-A204-F30AAFC87846",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0:rc4:*:*:*:*:*:*",
"matchCriteriaId": "53BCFBFB-6AF0-4525-8623-7633CC5E17DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0:rc5:*:*:*:*:*:*",
"matchCriteriaId": "6ED4E86A-74F0-436A-BEB4-3F4EE93A5421",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0:rc6:*:*:*:*:*:*",
"matchCriteriaId": "BF0365B0-8E16-4F30-BD92-5DD538CC8135",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0:rc7:*:*:*:*:*:*",
"matchCriteriaId": "079505E8-2942-4C33-93D1-35ADA4C39E72",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "38989541-2360-4E0A-AE5A-3D6144AA6114",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4E51646B-7A0E-40F3-B8C9-239C1DA81DD1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "42A8A507-F8E2-491C-A144-B2448A1DB26E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "901FC6F3-2C2A-4112-AE27-AB102BBE8DEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "203AD334-DB9F-41B0-A4D1-A6C158EF8C40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "B3611753-E440-410F-8250-600C996A4B8E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "9739BB47-EEAF-42F1-A557-2AE2EA9526A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "5A95E3BB-0AFC-4C2E-B9BE-C975E902A266",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "482A6C9A-9B8E-4D1C-917A-F16370745E7C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "C6D87357-63E0-41D0-9F02-1BCBF9A77E63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "3765A2D6-2D78-4FB1-989E-D5106BFA3F5E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "F54257DB-7023-43C4-AC4D-9590B815CD92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.13:*:*:*:*:*:*:*",
"matchCriteriaId": "61FF5FCD-A4A1-4803-AC53-320A4C838AF6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "9F096553-064F-46A2-877B-F32F163A0F49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.15:*:*:*:*:*:*:*",
"matchCriteriaId": "C0D762D1-E3AD-40EA-8D39-83EEB51B5E85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.16:*:*:*:*:*:*:*",
"matchCriteriaId": "A6187D19-7148-4B87-AD7E-244FF9EE0FA6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.17:*:*:*:*:*:*:*",
"matchCriteriaId": "99AC64C2-E391-485C-9CD7-BA09C8FA5E63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.18:*:*:*:*:*:*:*",
"matchCriteriaId": "8CDA5E95-7805-441B-BEF7-4448EA45E964",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.19:*:*:*:*:*:*:*",
"matchCriteriaId": "51561053-6C28-4F38-BC9B-3F7A7508EB72",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.20:*:*:*:*:*:*:*",
"matchCriteriaId": "118F4A5B-C498-4FC3-BE28-50D18EBE4F22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.21:*:*:*:*:*:*:*",
"matchCriteriaId": "BD38EBE6-FE1A-4B55-9FB5-07952253B7A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.22:*:*:*:*:*:*:*",
"matchCriteriaId": "3A491E47-82AD-4055-9444-2EC0D6715326",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.23:*:*:*:*:*:*:*",
"matchCriteriaId": "13C5FD16-23B6-467F-9438-5B554922F974",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.24:*:*:*:*:*:*:*",
"matchCriteriaId": "9C67235F-5B51-4BF7-89EC-4810F720246F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.25:*:*:*:*:*:*:*",
"matchCriteriaId": "08405DEF-05F4-45F0-AC95-DBF914A36D93",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.26:*:*:*:*:*:*:*",
"matchCriteriaId": "1A7B9C4B-4A41-4175-9F07-191C1EE98C1F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.27:*:*:*:*:*:*:*",
"matchCriteriaId": "B306E0A8-4D4A-4895-8128-A500D30A7E0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.28:*:*:*:*:*:*:*",
"matchCriteriaId": "295C839A-F34E-4853-A926-55EABC639412",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.29:*:*:*:*:*:*:*",
"matchCriteriaId": "2AFD5F49-7EF9-4CFE-95BD-8FD19B500B0A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.30:*:*:*:*:*:*:*",
"matchCriteriaId": "00B3DDDD-B2F6-4753-BA38-65A24017857D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.31:*:*:*:*:*:*:*",
"matchCriteriaId": "33FCD39E-F4BF-432D-9CF9-F195CF5844F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.32:*:*:*:*:*:*:*",
"matchCriteriaId": "C7308690-CB0D-4758-B80F-D2ADCD2A9D66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.33:*:*:*:*:*:*:*",
"matchCriteriaId": "313A470B-8A2B-478A-82B5-B27D2718331C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.34:*:*:*:*:*:*:*",
"matchCriteriaId": "83FF021E-07E3-41CC-AAE8-D99D7FF24B9D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.35:*:*:*:*:*:*:*",
"matchCriteriaId": "F72412E3-8DA9-4CC9-A426-B534202ADBA4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.36:*:*:*:*:*:*:*",
"matchCriteriaId": "FCAA9D7A-3C3E-4C0B-9D38-EA80E68C2E46",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.37:*:*:*:*:*:*:*",
"matchCriteriaId": "4A9E3AE5-3FCF-4CBB-A30B-082BCFBFB0CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.38:*:*:*:*:*:*:*",
"matchCriteriaId": "CF715657-4C3A-4392-B85D-1BBF4DE45D89",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.39:*:*:*:*:*:*:*",
"matchCriteriaId": "4B63C618-AC3D-4EF7-AFDF-27B9BF482B78",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.40:*:*:*:*:*:*:*",
"matchCriteriaId": "C33DA5A9-5E40-4365-9602-82FB4DCD15B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.41:*:*:*:*:*:*:*",
"matchCriteriaId": "EFAFDB74-40BD-46FA-89AC-617EB2C7160B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.42:*:*:*:*:*:*:*",
"matchCriteriaId": "CF5F17DA-30A7-40CF-BD7C-CEDF06D64617",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.43:*:*:*:*:*:*:*",
"matchCriteriaId": "71A276F5-BD9D-4C1B-90DF-9B0C15B6F7DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.44:*:*:*:*:*:*:*",
"matchCriteriaId": "F8F6EBEC-3C29-444B-BB85-6EF239B59EC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3DFFE5A6-6A67-4992-84A3-C0F05FACDEAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.1:rc1:*:*:*:*:*:*",
"matchCriteriaId": "13BBD2A3-AE10-48B9-8776-4FB1CAC37D44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.1:rc2:*:*:*:*:*:*",
"matchCriteriaId": "B25680CC-8918-4F27-8D7E-A6579215450B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.1:rc3:*:*:*:*:*:*",
"matchCriteriaId": "92C48B4C-410C-4BA8-A28A-B2E928320FCC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.1:rc4:*:*:*:*:*:*",
"matchCriteriaId": "CB447523-855B-461E-8197-95169BE86EB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B155BBDF-6DF6-4FF5-9C41-D8A5266DCC67",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "28476DEC-9630-4B40-9D4D-9BC151DC4CA4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "5646880A-2355-4BDD-89E7-825863A0311F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7FF99148-267A-46F8-9927-A9082269BAF6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "A783C083-5D9C-48F9-B5A6-A97A9604FB19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "2B817A24-03AC-46CD-BEFA-505457FD2A5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "51CF1BCE-090E-4B70-BA16-ACB74411293B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.1.8:*:*:*:*:*:*:*",
"matchCriteriaId": "187AAD67-10D7-4B57-B4C6-00443E246AF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.1.9:*:*:*:*:*:*:*",
"matchCriteriaId": "F341CE88-C5BC-4CDD-9CB5-B6BAD7152E63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.1.10:*:*:*:*:*:*:*",
"matchCriteriaId": "37ACE2A6-C229-4236-8E9F-235F008F3AA0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D3220B70-917F-4F9F-8A3B-2BF581281E8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.2:rc2:*:*:*:*:*:*",
"matchCriteriaId": "99372D07-C06A-41FA-9843-6D57F99AB5AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.2:rc3:*:*:*:*:*:*",
"matchCriteriaId": "2B9DC110-D260-4DB4-B8B0-EF1D160ADA07",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.2:rc4:*:*:*:*:*:*",
"matchCriteriaId": "6192FE84-4D53-40D4-AF61-78CE7136141A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.2:rc5:*:*:*:*:*:*",
"matchCriteriaId": "42FEF3CF-1302-45EB-89CC-3786FE4BAC1F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.2:rc6:*:*:*:*:*:*",
"matchCriteriaId": "AE6A6B58-2C89-4DE4-BA57-78100818095C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.2:rc7:*:*:*:*:*:*",
"matchCriteriaId": "1D467F87-2F13-4D26-9A93-E0BA526FEA24",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FE348F7B-02DE-47D5-8011-F83DA9426021",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E91594EA-F0A3-41B3-A9C6-F7864FC2F229",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "9E1ECCDB-0208-48F6-B44F-16CC0ECE3503",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "FBA8B5DE-372E-47E0-A0F6-BE286D509CC3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "9A1CA083-2CF8-45AE-9E15-1AA3A8352E3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "19D69A49-5290-4C5F-8157-719AD58D253D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "290BD969-42E7-47B0-B21B-06DE4865432C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "23A9E29E-DE78-4C73-9FBD-C2410F5FC8B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "018434C9-E75F-45CB-A169-DAB4B1D864D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "DC0AC68F-EC58-4C4F-8CBC-A59ECC00CCDE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.2.11:*:*:*:*:*:*:*",
"matchCriteriaId": "C123C844-F6D7-471E-A62E-F756042FB1CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.2.12:*:*:*:*:*:*:*",
"matchCriteriaId": "A11C38BB-7FA2-49B0-AAC9-83DB387A06DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.2.13:*:*:*:*:*:*:*",
"matchCriteriaId": "61F3733C-E5F6-4855-B471-DF3FB823613B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.2.14:*:*:*:*:*:*:*",
"matchCriteriaId": "1DDCA75F-9A06-4457-9A45-38A38E7F7086",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.2.15:*:*:*:*:*:*:*",
"matchCriteriaId": "7AEA837E-7864-4003-8DB7-111ED710A7E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.2.16:*:*:*:*:*:*:*",
"matchCriteriaId": "B6FE471F-2D1F-4A1D-A197-7E46B75787E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.2.17:*:*:*:*:*:*:*",
"matchCriteriaId": "FDA9E6AB-58DC-4EC5-A25C-11F9D0B38BF7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.2.18:*:*:*:*:*:*:*",
"matchCriteriaId": "DC6B8DB3-B05B-41A2-B091-342D66AAE8F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.2.19:*:*:*:*:*:*:*",
"matchCriteriaId": "958F0FF8-33EF-4A71-A0BD-572C85211DBA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.2.20:*:*:*:*:*:*:*",
"matchCriteriaId": "FBA39F48-B02F-4C48-B304-DA9CCA055244",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.2.21:*:*:*:*:*:*:*",
"matchCriteriaId": "1FF841F3-48A7-41D7-9C45-A8170435A5EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.2.22:*:*:*:*:*:*:*",
"matchCriteriaId": "EF506916-A6DC-4B1E-90E5-959492AF55F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.2.23:*:*:*:*:*:*:*",
"matchCriteriaId": "B3CDAD1F-2C6A-48C0-8FAB-C2659373FA25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.2.24:*:*:*:*:*:*:*",
"matchCriteriaId": "4FFE4B22-C96A-43D0-B993-F51EDD9C5E0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.2.25:*:*:*:*:*:*:*",
"matchCriteriaId": "F571CC8B-B212-4553-B463-1DB01D616E8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.2.26:*:*:*:*:*:*:*",
"matchCriteriaId": "84E3E151-D437-48ED-A529-731EEFF88567",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.2.27:*:*:*:*:*:*:*",
"matchCriteriaId": "E9E3EA3C-CCA5-4433-86E0-3D02C4757A0A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.2.28:*:*:*:*:*:*:*",
"matchCriteriaId": "F7AC4F7D-9FA6-4CF1-B2E9-70BF7D4D177C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.2.29:*:*:*:*:*:*:*",
"matchCriteriaId": "3CE3A80D-9648-43CC-8F99-D741ED6552BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.2.30:*:*:*:*:*:*:*",
"matchCriteriaId": "C8A98C03-A465-41B4-A551-A26FEC7FFD94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "AFB76697-1C2F-48C0-9B14-517EC053D4B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.3:rc1:*:*:*:*:*:*",
"matchCriteriaId": "BED88DFD-1DC5-4505-A441-44ECDEF0252D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.3:rc2:*:*:*:*:*:*",
"matchCriteriaId": "DBFD2ACD-728A-4082-BB6A-A1EF6E58E47D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.3:rc3:*:*:*:*:*:*",
"matchCriteriaId": "C31B0E51-F62D-4053-B04F-FC4D5BC373D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.3:rc4:*:*:*:*:*:*",
"matchCriteriaId": "A914303E-1CB6-4AAD-9F5F-DE5433C4E814",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.3:rc5:*:*:*:*:*:*",
"matchCriteriaId": "203BBA69-90B2-4C5E-8023-C14180742421",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.3:rc6:*:*:*:*:*:*",
"matchCriteriaId": "0DBFAB53-B889-4028-AC0E-7E165B152A18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.3:rc7:*:*:*:*:*:*",
"matchCriteriaId": "FE409AEC-F677-4DEF-8EB7-2C35809043CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "578EC12B-402F-4AD4-B8F8-C9B2CAB06891",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "877002ED-8097-4BB4-BB88-6FC6306C38B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "76294CE3-D72C-41D5-9E0F-B693D0042699",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "916E97D4-1FAB-42F5-826B-653B1C0909A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "33FD2217-C5D0-48C1-AD74-3527127FEF9C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "2E92971F-B629-4E0A-9A50-8B235F9704B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "EDD3A069-3829-4EE2-9D5A-29459F29D4C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "A4A0964C-CEB2-41D7-A69C-1599B05B6171",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "0F960FA6-F904-4A4E-B483-44C70090E9A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc1:*:*:*:*:*:*",
"matchCriteriaId": "261C1B41-C9E0-414F-8368-51C0C0B8AD38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc2:*:*:*:*:*:*",
"matchCriteriaId": "5CCA261D-2B97-492F-89A0-5F209A804350",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc3:*:*:*:*:*:*",
"matchCriteriaId": "1B1C0C68-9194-473F-BE5E-EC7F184899FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc4:*:*:*:*:*:*",
"matchCriteriaId": "D7A6AC9E-BEA6-44B0-B3B3-F0F94E32424A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc5:*:*:*:*:*:*",
"matchCriteriaId": "16038328-9399-4B85-B777-BA4757D02C9B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc6:*:*:*:*:*:*",
"matchCriteriaId": "16CA2757-FA8D-43D9-96E8-D3C0EB6E1DEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc7:*:*:*:*:*:*",
"matchCriteriaId": "E8CB5481-5EAE-401E-BD7E-D3095CCA9E94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A0F36FAC-141D-476D-84C5-A558C199F904",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "51D64824-25F6-4761-BD6A-29038A143744",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E284C8A1-740F-454D-A774-99CD3A21B594",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "C70D72AE-0CBF-4324-9935-57E28EC6279C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "F674B06B-7E86-4E41-9126-8152D0DDABAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.4.6:*:*:*:*:*:*:*",
"matchCriteriaId": "7039B3EC-8B22-413E-B582-B4BEC6181241",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "35CF1DD2-80B9-4476-8963-5C3EF52B33F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "BFB0B05B-A5CE-4B9C-AE7F-83062868D35B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.4.9:*:*:*:*:*:*:*",
"matchCriteriaId": "D166A66E-7454-47EC-BB56-861A9AFEAFE1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.4.10:*:*:*:*:*:*:*",
"matchCriteriaId": "7DA94F50-2A62-4300-BF4D-A342AAE35629",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.4.11:*:*:*:*:*:*:*",
"matchCriteriaId": "252D937B-50DC-444F-AE73-5FCF6203DF27",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.4.12:*:*:*:*:*:*:*",
"matchCriteriaId": "F6D8EE51-02C1-47BC-A92C-0A8ABEFD28FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.4.13:*:*:*:*:*:*:*",
"matchCriteriaId": "7F20A5D7-3B38-4911-861A-04C8310D5916",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.4.14:*:*:*:*:*:*:*",
"matchCriteriaId": "D472DE3A-71D8-4F40-9DDE-85929A2B047D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.4.15:*:*:*:*:*:*:*",
"matchCriteriaId": "B2AED943-65A8-4FDB-BBD0-CCEF8682A48C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.4.16:*:*:*:*:*:*:*",
"matchCriteriaId": "D4640185-F3D8-4575-A71D-4C889A93DE2C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.4.17:*:*:*:*:*:*:*",
"matchCriteriaId": "144CCF7C-025E-4879-B2E7-ABB8E4390BE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.4.18:*:*:*:*:*:*:*",
"matchCriteriaId": "B6FAA052-0B2B-40CE-8C98-919B8D08A5ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.4.19:*:*:*:*:*:*:*",
"matchCriteriaId": "4B5A53DE-9C83-4A6B-96F3-23C03BF445D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.4.20:*:*:*:*:*:*:*",
"matchCriteriaId": "063EB879-CB05-4E33-AA90-9E43516839B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.4.21:*:*:*:*:*:*:*",
"matchCriteriaId": "2D25764F-4B02-4C65-954E-8C7D6632DE00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.4.22:*:*:*:*:*:*:*",
"matchCriteriaId": "F31F5BF3-CD0A-465C-857F-273841BCD28A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.4.23:*:*:*:*:*:*:*",
"matchCriteriaId": "FF302C8A-079B-42B9-B455-CD9083BFA067",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.4.24:*:*:*:*:*:*:*",
"matchCriteriaId": "744999C0-33D3-4363-B3DB-E0D02CDD3918",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "962B0C45-AB29-4383-AC16-C6E8245D0FF7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A0EE126B-74B2-4F79-BFE1-3DC169F3F9B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "392075E0-A9C7-4B4A-90F9-7F1ADFF5EFA7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "ECC66968-06F0-4874-A95A-A292C36E45C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.5.5:*:*:*:*:*:*:*",
"matchCriteriaId": "5FE986E6-1068-4E1B-8EAB-DF1EAF32B4E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.5.6:*:*:*:*:*:*:*",
"matchCriteriaId": "543E8536-1A8E-4E76-B89F-1B1F9F26FAB8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.5.7:*:*:*:*:*:*:*",
"matchCriteriaId": "EC2B45E3-31E1-4B46-85FA-3A84E75B8F84",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "DDB8CC75-D3EE-417C-A83D-CB6D666FE595",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "09A072F1-7BEE-4236-ACBB-55DB8FEF4A03",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E19D5A58-17D6-4502-A57A-70B2F84817A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D58BA035-1204-4DFA-98A1-12111FB6222E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "A17F2E87-8EB8-476A-B5B5-9AE5CF53D9FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "A8CCC101-5852-4299-9B67-EA1B149D58C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "B8074D32-C252-4AD3-A579-1C5EDDD7014B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "962AA802-8179-4606-AAC0-9363BAEABC9F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "1286C858-D5A2-45F3-86D1-E50FE53FB23C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.6.9:*:*:*:*:*:*:*",
"matchCriteriaId": "5AC4A13E-F560-4D01-98A3-E2A2B82EB25B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.6.10:*:*:*:*:*:*:*",
"matchCriteriaId": "942C462A-5398-4BB9-A792-598682E1FEF2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.6.11:*:*:*:*:*:*:*",
"matchCriteriaId": "B852F7E0-0282-483D-BB4D-18CB7A4F1392",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "53ED9A31-99CC-41C8-8B72-5B2A9B49AA6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EFD646BC-62F7-47CF-B0BE-768F701F7D9A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F43D418E-87C1-4C83-9FF1-4F45B4F452DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "680D0E00-F29A-487C-8770-8E7EAC672B7C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "2DCA96A4-A836-4E94-A39C-3AD3EA1D9611",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.7.5:*:*:*:*:*:*:*",
"matchCriteriaId": "753C05E3-B603-4E36-B9BA-FAEDCBF62A7D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.7.6:*:*:*:*:*:*:*",
"matchCriteriaId": "E385C2E0-B9F1-4564-8E6D-56FD9E762405",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.7.7:*:*:*:*:*:*:*",
"matchCriteriaId": "041335D4-05E1-4004-9381-28AAD5994B47",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.7.8:*:*:*:*:*:*:*",
"matchCriteriaId": "370F2AE5-3DBC-46B9-AC70-F052C9229C00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.7.9:*:*:*:*:*:*:*",
"matchCriteriaId": "7A971BE3-259D-4494-BBC5-12793D92DB57",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.7.10:*:*:*:*:*:*:*",
"matchCriteriaId": "8E4719A6-FDEA-4714-A830-E23A52AE90BC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "block/scsi_ioctl.c in the Linux kernel through 3.8 does not properly consider the SCSI device class during authorization of SCSI commands, which allows local users to bypass intended access restrictions via an SG_IO ioctl call that leverages overlapping opcodes."
},
{
"lang": "es",
"value": "block / scsi_ioctl.c en el kernel de Linux a trav\u00e9s de v3,8 no tiene debidamente en cuenta la clase de dispositivo SCSI durante la autorizaci\u00f3n de los comandos SCSI, lo que permite a usuarios locales eludir restricciones de acceso destinados a trav\u00e9s de una llamada ioctl SG_IO que aprovecha c\u00f3digos de operaci\u00f3n que se superponen."
}
],
"id": "CVE-2012-4542",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2013-02-28T19:55:01.107",
"references": [
{
"source": "secalert@redhat.com",
"url": "http://marc.info/?l=linux-kernel\u0026m=135903967015813\u0026w=2"
},
{
"source": "secalert@redhat.com",
"url": "http://marc.info/?l=linux-kernel\u0026m=135904012416042\u0026w=2"
},
{
"source": "secalert@redhat.com",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0496.html"
},
{
"source": "secalert@redhat.com",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0579.html"
},
{
"source": "secalert@redhat.com",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0882.html"
},
{
"source": "secalert@redhat.com",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0928.html"
},
{
"source": "secalert@redhat.com",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=875360"
},
{
"source": "secalert@redhat.com",
"url": "https://oss.oracle.com/git/?p=redpatch.git%3Ba=commit%3Bh=76a274e17114abf1a77de6b651424648ce9e10c8"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://marc.info/?l=linux-kernel\u0026m=135903967015813\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://marc.info/?l=linux-kernel\u0026m=135904012416042\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0496.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0579.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0882.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0928.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=875360"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oss.oracle.com/git/?p=redpatch.git%3Ba=commit%3Bh=76a274e17114abf1a77de6b651424648ce9e10c8"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-264"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GSD-2012-4542
Vulnerability from gsd - Updated: 2023-12-13 01:20{
"GSD": {
"alias": "CVE-2012-4542",
"description": "block/scsi_ioctl.c in the Linux kernel through 3.8 does not properly consider the SCSI device class during authorization of SCSI commands, which allows local users to bypass intended access restrictions via an SG_IO ioctl call that leverages overlapping opcodes.",
"id": "GSD-2012-4542",
"references": [
"https://www.suse.com/security/cve/CVE-2012-4542.html",
"https://access.redhat.com/errata/RHSA-2013:0928",
"https://access.redhat.com/errata/RHSA-2013:0882",
"https://access.redhat.com/errata/RHSA-2013:0622",
"https://access.redhat.com/errata/RHSA-2013:0579",
"https://access.redhat.com/errata/RHSA-2013:0496",
"https://linux.oracle.com/cve/CVE-2012-4542.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2012-4542"
],
"details": "block/scsi_ioctl.c in the Linux kernel through 3.8 does not properly consider the SCSI device class during authorization of SCSI commands, which allows local users to bypass intended access restrictions via an SG_IO ioctl call that leverages overlapping opcodes.",
"id": "GSD-2012-4542",
"modified": "2023-12-13T01:20:15.304350Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-4542",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "block/scsi_ioctl.c in the Linux kernel through 3.8 does not properly consider the SCSI device class during authorization of SCSI commands, which allows local users to bypass intended access restrictions via an SG_IO ioctl call that leverages overlapping opcodes."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://rhn.redhat.com/errata/RHSA-2013-0496.html",
"refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0496.html"
},
{
"name": "http://rhn.redhat.com/errata/RHSA-2013-0579.html",
"refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0579.html"
},
{
"name": "http://rhn.redhat.com/errata/RHSA-2013-0882.html",
"refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0882.html"
},
{
"name": "http://rhn.redhat.com/errata/RHSA-2013-0928.html",
"refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0928.html"
},
{
"name": "http://marc.info/?l=linux-kernel\u0026m=135903967015813\u0026w=2",
"refsource": "MISC",
"url": "http://marc.info/?l=linux-kernel\u0026m=135903967015813\u0026w=2"
},
{
"name": "http://marc.info/?l=linux-kernel\u0026m=135904012416042\u0026w=2",
"refsource": "MISC",
"url": "http://marc.info/?l=linux-kernel\u0026m=135904012416042\u0026w=2"
},
{
"name": "https://oss.oracle.com/git/?p=redpatch.git%3Ba=commit%3Bh=76a274e17114abf1a77de6b651424648ce9e10c8",
"refsource": "MISC",
"url": "https://oss.oracle.com/git/?p=redpatch.git%3Ba=commit%3Bh=76a274e17114abf1a77de6b651424648ce9e10c8"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=875360",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=875360"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.2.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.4.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.25:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.4.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.2.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.2.23:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.4.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.6.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.5.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.2.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0:rc7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.3:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.38:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.1:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.1:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.2.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.2.26:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.4:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.36:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.4.23:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.35:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.3:rc5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.34:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.4:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.3:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.5.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.7.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.32:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.4:rc7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.2:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.4.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.4.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.2.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.4.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.7.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.2:rc5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.3.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.2.27:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.37:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.3.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.2:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.27:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0:rc6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.3.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.3:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.4.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.2.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.7.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.42:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.23:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.7.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.2.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.2.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.4.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.3.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.2.29:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.40:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.4.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.33:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.4.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.28:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.5.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.6.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.3.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.6.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.2.25:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.2.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.6.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.7.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.4.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.7.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.4.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.2.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.6.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0:rc5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.2.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.1:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.1.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.6.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.2.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.2.24:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.6.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.4.24:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.2.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.2.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.4:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.1.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.2:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.44:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.5.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.2.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.8.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.4.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.1.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.2.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.2.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.5.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.24:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.6.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.3.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.4.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.5.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.2.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.39:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.4:rc6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.6.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.4.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.7.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.3:rc6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.5.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.3:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.4.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.1.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.7.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.4.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.3.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.6.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.7.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.3:rc7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.2.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.7.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.2:rc6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.2.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.2:rc7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.4:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.4.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.4.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.2.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.1.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.4:rc5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.26:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.43:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.31:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.29:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.2.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.4.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.2.28:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.6.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.4.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.4.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.1:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.2.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.41:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-4542"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "block/scsi_ioctl.c in the Linux kernel through 3.8 does not properly consider the SCSI device class during authorization of SCSI commands, which allows local users to bypass intended access restrictions via an SG_IO ioctl call that leverages overlapping opcodes."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-264"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "[linux-kernel] 20130124 [PATCH 04/13] sg_io: resolve conflicts between commands assigned to multiple classes (CVE-2012-4542)",
"refsource": "MLIST",
"tags": [],
"url": "http://marc.info/?l=linux-kernel\u0026m=135904012416042\u0026w=2"
},
{
"name": "[linux-kernel] 20130124 [PATCH 00/13] Corrections and customization of the SG_IO command whitelist (CVE-2012-4542)",
"refsource": "MLIST",
"tags": [],
"url": "http://marc.info/?l=linux-kernel\u0026m=135903967015813\u0026w=2"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=875360",
"refsource": "CONFIRM",
"tags": [],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=875360"
},
{
"name": "RHSA-2013:0496",
"refsource": "REDHAT",
"tags": [],
"url": "http://rhn.redhat.com/errata/RHSA-2013-0496.html"
},
{
"name": "RHSA-2013:0579",
"refsource": "REDHAT",
"tags": [],
"url": "http://rhn.redhat.com/errata/RHSA-2013-0579.html"
},
{
"name": "RHSA-2013:0882",
"refsource": "REDHAT",
"tags": [],
"url": "http://rhn.redhat.com/errata/RHSA-2013-0882.html"
},
{
"name": "RHSA-2013:0928",
"refsource": "REDHAT",
"tags": [],
"url": "http://rhn.redhat.com/errata/RHSA-2013-0928.html"
},
{
"name": "https://oss.oracle.com/git/?p=redpatch.git%3Ba=commit%3Bh=76a274e17114abf1a77de6b651424648ce9e10c8",
"refsource": "MISC",
"tags": [],
"url": "https://oss.oracle.com/git/?p=redpatch.git%3Ba=commit%3Bh=76a274e17114abf1a77de6b651424648ce9e10c8"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2023-02-13T00:26Z",
"publishedDate": "2013-02-28T19:55Z"
}
}
}
RHSA-2013:0622
Vulnerability from csaf_redhat - Published: 2013-03-11 18:31 - Updated: 2025-11-21 17:42block/scsi_ioctl.c in the Linux kernel through 3.8 does not properly consider the SCSI device class during authorization of SCSI commands, which allows local users to bypass intended access restrictions via an SG_IO ioctl call that leverages overlapping opcodes.
The msr_open function in arch/x86/kernel/msr.c in the Linux kernel before 3.7.6 allows local users to bypass intended capability restrictions by executing a crafted application as root, as demonstrated by msr32.c.
The __skb_recv_datagram function in net/core/datagram.c in the Linux kernel before 3.8 does not properly handle the MSG_PEEK flag with zero-length data, which allows local users to cause a denial of service (infinite loop and system hang) via a crafted application.
Race condition in the ptrace functionality in the Linux kernel before 3.7.5 allows local users to gain privileges via a PTRACE_SETREGS ptrace system call in a crafted application, as demonstrated by ptrace_death.
Array index error in the __sock_diag_rcv_msg function in net/core/sock_diag.c in the Linux kernel before 3.7.10 allows local users to gain privileges via a large family value in a Netlink message.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated kernel-rt packages that fix several security issues and three bugs\nare now available for Red Hat Enterprise MRG 2.3.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues:\n\n* A flaw was found in the way file permission checks for the\n\"/dev/cpu/[x]/msr\" files were performed in restricted root environments\n(for example, when using a capability-based security model). A local user\nwith the ability to write to these files could use this flaw to escalate\ntheir privileges to kernel level, for example, by writing to the\nSYSENTER_EIP_MSR register. (CVE-2013-0268, Important)\n\n* A race condition was found in the way the Linux kernel\u0027s ptrace\nimplementation handled PTRACE_SETREGS requests when the debuggee was woken\ndue to a SIGKILL signal instead of being stopped. A local, unprivileged\nuser could use this flaw to escalate their privileges. (CVE-2013-0871,\nImportant)\n\n* An out-of-bounds access flaw was found in the way SOCK_DIAG_BY_FAMILY\nNetlink messages were processed in the Linux kernel. A local, unprivileged\nuser could use this flaw to escalate their privileges. (CVE-2013-1763,\nImportant)\n\n* It was found that the default SCSI command filter does not accommodate\ncommands that overlap across device classes. A privileged guest user could\npotentially use this flaw to write arbitrary data to a LUN that is\npassed-through as read-only. (CVE-2012-4542, Moderate)\n\n* A flaw was found in the way the __skb_recv_datagram() function in the\nLinux kernel processed payload-less socket buffers (skb) when the MSG_PEEK\noption was requested. A local, unprivileged user could use this flaw to\ncause a denial of service (infinite loop). (CVE-2013-0290, Moderate)\n\nThe CVE-2012-4542 issue was discovered by Paolo Bonzini of Red Hat.\n\nThis update also fixes the following bugs:\n\n* There was high contention on run-queue lock when load balancing before\nidling, causing latency spikes on high CPU core count systems. With this\nupdate, IPI is used to send notification to cores with pending work, and\nthe cores push the work rather than trying to pull it, resolving this\nissue. (BZ#858396)\n\n* Previously, ACPI lock was converted to an rt_mutex, leading to a\ntraceback when scheduling while atomic. With this update, ACPI lock has\nbeen converted back to a raw spinlock. (BZ#909965)\n\n* Fibre Channel (FC)/iSCSI device state was set to off-line and after a\ntimeout, not set back to running. Such a device would not come back online\nafter a fast_io_fail or timeout. With this update, an explicit check for\nthe device being offline has been added, and the device is set back to\nrunning when re-initializing, allowing devices to recover after a failure\nor timeout. (BZ#912942)\n\nUsers should upgrade to these updated packages, which correct these issues.\nThe system must be rebooted for this update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2013:0622",
"url": "https://access.redhat.com/errata/RHSA-2013:0622"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "858396",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=858396"
},
{
"category": "external",
"summary": "875360",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=875360"
},
{
"category": "external",
"summary": "908693",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=908693"
},
{
"category": "external",
"summary": "911473",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=911473"
},
{
"category": "external",
"summary": "911937",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=911937"
},
{
"category": "external",
"summary": "915052",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=915052"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_0622.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2025-11-21T17:42:56+00:00",
"generator": {
"date": "2025-11-21T17:42:56+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2013:0622",
"initial_release_date": "2013-03-11T18:31:00+00:00",
"revision_history": [
{
"date": "2013-03-11T18:31:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2013-03-11T18:36:36+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:42:56+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat MRG Realtime for RHEL 6 Server v.2",
"product": {
"name": "Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise MRG for RHEL-6"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:3.6.11-rt30.25.el6rt.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:3.6.11-rt30.25.el6rt.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:3.6.11-rt30.25.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@3.6.11-rt30.25.el6rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-vanilla-0:3.6.11-rt30.25.el6rt.x86_64",
"product": {
"name": "kernel-rt-vanilla-0:3.6.11-rt30.25.el6rt.x86_64",
"product_id": "kernel-rt-vanilla-0:3.6.11-rt30.25.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-vanilla@3.6.11-rt30.25.el6rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-devel-0:3.6.11-rt30.25.el6rt.x86_64",
"product": {
"name": "kernel-rt-trace-devel-0:3.6.11-rt30.25.el6rt.x86_64",
"product_id": "kernel-rt-trace-devel-0:3.6.11-rt30.25.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-devel@3.6.11-rt30.25.el6rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@3.6.11-rt30.25.el6rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:3.6.11-rt30.25.el6rt.x86_64",
"product": {
"name": "kernel-rt-debug-0:3.6.11-rt30.25.el6rt.x86_64",
"product_id": "kernel-rt-debug-0:3.6.11-rt30.25.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@3.6.11-rt30.25.el6rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-vanilla-devel-0:3.6.11-rt30.25.el6rt.x86_64",
"product": {
"name": "kernel-rt-vanilla-devel-0:3.6.11-rt30.25.el6rt.x86_64",
"product_id": "kernel-rt-vanilla-devel-0:3.6.11-rt30.25.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@3.6.11-rt30.25.el6rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:3.6.11-rt30.25.el6rt.x86_64",
"product": {
"name": "kernel-rt-devel-0:3.6.11-rt30.25.el6rt.x86_64",
"product_id": "kernel-rt-devel-0:3.6.11-rt30.25.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@3.6.11-rt30.25.el6rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64",
"product": {
"name": "kernel-rt-trace-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64",
"product_id": "kernel-rt-trace-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@3.6.11-rt30.25.el6rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-vanilla-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64",
"product": {
"name": "kernel-rt-vanilla-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64",
"product_id": "kernel-rt-vanilla-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@3.6.11-rt30.25.el6rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-0:3.6.11-rt30.25.el6rt.x86_64",
"product": {
"name": "kernel-rt-0:3.6.11-rt30.25.el6rt.x86_64",
"product_id": "kernel-rt-0:3.6.11-rt30.25.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@3.6.11-rt30.25.el6rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:3.6.11-rt30.25.el6rt.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:3.6.11-rt30.25.el6rt.x86_64",
"product_id": "kernel-rt-debug-devel-0:3.6.11-rt30.25.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@3.6.11-rt30.25.el6rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-0:3.6.11-rt30.25.el6rt.x86_64",
"product": {
"name": "kernel-rt-trace-0:3.6.11-rt30.25.el6rt.x86_64",
"product_id": "kernel-rt-trace-0:3.6.11-rt30.25.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace@3.6.11-rt30.25.el6rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64",
"product_id": "kernel-rt-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@3.6.11-rt30.25.el6rt?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-doc-0:3.6.11-rt30.25.el6rt.noarch",
"product": {
"name": "kernel-rt-doc-0:3.6.11-rt30.25.el6rt.noarch",
"product_id": "kernel-rt-doc-0:3.6.11-rt30.25.el6rt.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-doc@3.6.11-rt30.25.el6rt?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "mrg-rt-release-0:3.6.11-rt30.25.el6rt.noarch",
"product": {
"name": "mrg-rt-release-0:3.6.11-rt30.25.el6rt.noarch",
"product_id": "mrg-rt-release-0:3.6.11-rt30.25.el6rt.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mrg-rt-release@3.6.11-rt30.25.el6rt?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-firmware-0:3.6.11-rt30.25.el6rt.noarch",
"product": {
"name": "kernel-rt-firmware-0:3.6.11-rt30.25.el6rt.noarch",
"product_id": "kernel-rt-firmware-0:3.6.11-rt30.25.el6rt.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-firmware@3.6.11-rt30.25.el6rt?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:3.6.11-rt30.25.el6rt.src",
"product": {
"name": "kernel-rt-0:3.6.11-rt30.25.el6rt.src",
"product_id": "kernel-rt-0:3.6.11-rt30.25.el6rt.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@3.6.11-rt30.25.el6rt?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.6.11-rt30.25.el6rt.src as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-0:3.6.11-rt30.25.el6rt.src"
},
"product_reference": "kernel-rt-0:3.6.11-rt30.25.el6rt.src",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.6.11-rt30.25.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-0:3.6.11-rt30.25.el6rt.x86_64"
},
"product_reference": "kernel-rt-0:3.6.11-rt30.25.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:3.6.11-rt30.25.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-0:3.6.11-rt30.25.el6rt.x86_64"
},
"product_reference": "kernel-rt-debug-0:3.6.11-rt30.25.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:3.6.11-rt30.25.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:3.6.11-rt30.25.el6rt.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:3.6.11-rt30.25.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:3.6.11-rt30.25.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:3.6.11-rt30.25.el6rt.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.6.11-rt30.25.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:3.6.11-rt30.25.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-devel-0:3.6.11-rt30.25.el6rt.x86_64"
},
"product_reference": "kernel-rt-devel-0:3.6.11-rt30.25.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-doc-0:3.6.11-rt30.25.el6rt.noarch as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-doc-0:3.6.11-rt30.25.el6rt.noarch"
},
"product_reference": "kernel-rt-doc-0:3.6.11-rt30.25.el6rt.noarch",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-firmware-0:3.6.11-rt30.25.el6rt.noarch as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-firmware-0:3.6.11-rt30.25.el6rt.noarch"
},
"product_reference": "kernel-rt-firmware-0:3.6.11-rt30.25.el6rt.noarch",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-0:3.6.11-rt30.25.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-0:3.6.11-rt30.25.el6rt.x86_64"
},
"product_reference": "kernel-rt-trace-0:3.6.11-rt30.25.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64"
},
"product_reference": "kernel-rt-trace-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-devel-0:3.6.11-rt30.25.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:3.6.11-rt30.25.el6rt.x86_64"
},
"product_reference": "kernel-rt-trace-devel-0:3.6.11-rt30.25.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vanilla-0:3.6.11-rt30.25.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-0:3.6.11-rt30.25.el6rt.x86_64"
},
"product_reference": "kernel-rt-vanilla-0:3.6.11-rt30.25.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vanilla-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64"
},
"product_reference": "kernel-rt-vanilla-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vanilla-devel-0:3.6.11-rt30.25.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:3.6.11-rt30.25.el6rt.x86_64"
},
"product_reference": "kernel-rt-vanilla-devel-0:3.6.11-rt30.25.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mrg-rt-release-0:3.6.11-rt30.25.el6rt.noarch as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:mrg-rt-release-0:3.6.11-rt30.25.el6rt.noarch"
},
"product_reference": "mrg-rt-release-0:3.6.11-rt30.25.el6rt.noarch",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Paolo Bonzini"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2012-4542",
"discovery_date": "2012-10-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "875360"
}
],
"notes": [
{
"category": "description",
"text": "block/scsi_ioctl.c in the Linux kernel through 3.8 does not properly consider the SCSI device class during authorization of SCSI commands, which allows local users to bypass intended access restrictions via an SG_IO ioctl call that leverages overlapping opcodes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: block: default SCSI command filter does not accomodate commands overlap across device classes",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 7. Due to the lack of upstream patches and the Moderate impact, we are not planning to address this issue in Red Hat Enterprise Linux 7.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Realtime-2:kernel-rt-0:3.6.11-rt30.25.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:3.6.11-rt30.25.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:3.6.11-rt30.25.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:mrg-rt-release-0:3.6.11-rt30.25.el6rt.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-4542"
},
{
"category": "external",
"summary": "RHBZ#875360",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=875360"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-4542",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4542"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-4542",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-4542"
}
],
"release_date": "2013-01-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-03-11T18:31:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-0:3.6.11-rt30.25.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:3.6.11-rt30.25.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:3.6.11-rt30.25.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:mrg-rt-release-0:3.6.11-rt30.25.el6rt.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:0622"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "ADJACENT_NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.9,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:A/AC:M/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"6Server-MRG-Realtime-2:kernel-rt-0:3.6.11-rt30.25.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:3.6.11-rt30.25.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:3.6.11-rt30.25.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:mrg-rt-release-0:3.6.11-rt30.25.el6rt.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: block: default SCSI command filter does not accomodate commands overlap across device classes"
},
{
"cve": "CVE-2013-0268",
"discovery_date": "2013-02-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "908693"
}
],
"notes": [
{
"category": "description",
"text": "The msr_open function in arch/x86/kernel/msr.c in the Linux kernel before 3.7.6 allows local users to bypass intended capability restrictions by executing a crafted application as root, as demonstrated by msr32.c.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: x86/msr: /dev/cpu/*/msr local privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did affect the version of Linux kernel as shipped with Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG 2.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Realtime-2:kernel-rt-0:3.6.11-rt30.25.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:3.6.11-rt30.25.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:3.6.11-rt30.25.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:mrg-rt-release-0:3.6.11-rt30.25.el6rt.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0268"
},
{
"category": "external",
"summary": "RHBZ#908693",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=908693"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0268",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0268"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0268",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0268"
}
],
"release_date": "2013-01-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-03-11T18:31:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-0:3.6.11-rt30.25.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:3.6.11-rt30.25.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:3.6.11-rt30.25.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:mrg-rt-release-0:3.6.11-rt30.25.el6rt.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:0622"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
"products": [
"6Server-MRG-Realtime-2:kernel-rt-0:3.6.11-rt30.25.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:3.6.11-rt30.25.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:3.6.11-rt30.25.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:mrg-rt-release-0:3.6.11-rt30.25.el6rt.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: x86/msr: /dev/cpu/*/msr local privilege escalation"
},
{
"cve": "CVE-2013-0290",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2013-02-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "911473"
}
],
"notes": [
{
"category": "description",
"text": "The __skb_recv_datagram function in net/core/datagram.c in the Linux kernel before 3.8 does not properly handle the MSG_PEEK flag with zero-length data, which allows local users to cause a denial of service (infinite loop and system hang) via a crafted application.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net: infinite loop in __skb_recv_datagram()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the version of Linux kernel as shipped with Red Hat Enterprise Linux 5 and 6.\n\nThis issue did affect the version of Linux kernel as shipped with Red Hat Enterprise MRG 2.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Realtime-2:kernel-rt-0:3.6.11-rt30.25.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:3.6.11-rt30.25.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:3.6.11-rt30.25.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:mrg-rt-release-0:3.6.11-rt30.25.el6rt.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0290"
},
{
"category": "external",
"summary": "RHBZ#911473",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=911473"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0290",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0290"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0290",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0290"
}
],
"release_date": "2013-02-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-03-11T18:31:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-0:3.6.11-rt30.25.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:3.6.11-rt30.25.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:3.6.11-rt30.25.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:mrg-rt-release-0:3.6.11-rt30.25.el6rt.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:0622"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 4.9,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"products": [
"6Server-MRG-Realtime-2:kernel-rt-0:3.6.11-rt30.25.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:3.6.11-rt30.25.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:3.6.11-rt30.25.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:mrg-rt-release-0:3.6.11-rt30.25.el6rt.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net: infinite loop in __skb_recv_datagram()"
},
{
"cve": "CVE-2013-0871",
"discovery_date": "2013-02-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "911937"
}
],
"notes": [
{
"category": "description",
"text": "Race condition in the ptrace functionality in the Linux kernel before 3.7.5 allows local users to gain privileges via a PTRACE_SETREGS ptrace system call in a crafted application, as demonstrated by ptrace_death.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition with PTRACE_SETREGS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did affect the versions of the kernel package as shipped with Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG 2. Future updates may address this issue.\n\nPlease note that while a public non-weaponized exploit exists, according to our testing the issue is very hard to hit.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Realtime-2:kernel-rt-0:3.6.11-rt30.25.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:3.6.11-rt30.25.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:3.6.11-rt30.25.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:mrg-rt-release-0:3.6.11-rt30.25.el6rt.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0871"
},
{
"category": "external",
"summary": "RHBZ#911937",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=911937"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0871",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0871"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0871",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0871"
}
],
"release_date": "2013-02-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-03-11T18:31:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-0:3.6.11-rt30.25.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:3.6.11-rt30.25.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:3.6.11-rt30.25.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:mrg-rt-release-0:3.6.11-rt30.25.el6rt.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:0622"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"products": [
"6Server-MRG-Realtime-2:kernel-rt-0:3.6.11-rt30.25.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:3.6.11-rt30.25.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:3.6.11-rt30.25.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:mrg-rt-release-0:3.6.11-rt30.25.el6rt.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition with PTRACE_SETREGS"
},
{
"cve": "CVE-2013-1763",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2013-02-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "915052"
}
],
"notes": [
{
"category": "description",
"text": "Array index error in the __sock_diag_rcv_msg function in net/core/sock_diag.c in the Linux kernel before 3.7.10 allows local users to gain privileges via a large family value in a Netlink message.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: sock_diag: out-of-bounds access to sock_diag_handlers[]",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of the kernel package as shipped with Red Hat Enterprise Linux 5 and 6.\n\nThis issue was addressed in Red Hat Enterprise MRG 2 via RHSA-2013:0622 https://rhn.redhat.com/errata/RHSA-2013-0622.html",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Realtime-2:kernel-rt-0:3.6.11-rt30.25.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:3.6.11-rt30.25.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:3.6.11-rt30.25.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:mrg-rt-release-0:3.6.11-rt30.25.el6rt.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1763"
},
{
"category": "external",
"summary": "RHBZ#915052",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=915052"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1763",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1763"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1763",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1763"
}
],
"release_date": "2013-02-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-03-11T18:31:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-0:3.6.11-rt30.25.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:3.6.11-rt30.25.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:3.6.11-rt30.25.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:mrg-rt-release-0:3.6.11-rt30.25.el6rt.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:0622"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"products": [
"6Server-MRG-Realtime-2:kernel-rt-0:3.6.11-rt30.25.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:3.6.11-rt30.25.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:3.6.11-rt30.25.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:3.6.11-rt30.25.el6rt.x86_64",
"6Server-MRG-Realtime-2:mrg-rt-release-0:3.6.11-rt30.25.el6rt.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: sock_diag: out-of-bounds access to sock_diag_handlers[]"
}
]
}
RHSA-2013:0882
Vulnerability from csaf_redhat - Published: 2013-05-30 18:24 - Updated: 2025-11-21 17:43The KVM subsystem in the Linux kernel before 3.6.9, when running on hosts that use qemu userspace without XSAVE, allows local users to cause a denial of service (kernel OOPS) by using the KVM_SET_SREGS ioctl to set the X86_CR4_OSXSAVE bit in the guest cr4 register, then calling the KVM_RUN ioctl.
block/scsi_ioctl.c in the Linux kernel through 3.8 does not properly consider the SCSI device class during authorization of SCSI commands, which allows local users to bypass intended access restrictions via an SG_IO ioctl call that leverages overlapping opcodes.
The translate_desc function in drivers/vhost/vhost.c in the Linux kernel before 3.7 does not properly handle cross-region descriptors, which allows guest OS users to obtain host OS privileges by leveraging KVM guest OS privileges.
Use-after-free vulnerability in the shmem_remount_fs function in mm/shmem.c in the Linux kernel before 3.7.10 allows local users to gain privileges or cause a denial of service (system crash) by remounting a tmpfs filesystem without specifying a required mpol (aka mempolicy) mount option.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated kernel packages that fix multiple security issues and several bugs\nare now available for Red Hat Enterprise Linux 6.2 Extended Update Support.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues:\n\n* A flaw was found in the way the vhost kernel module handled descriptors\nthat spanned multiple regions. A privileged guest user in a KVM\n(Kernel-based Virtual Machine) guest could use this flaw to crash the host\nor, potentially, escalate their privileges on the host. (CVE-2013-0311,\nImportant)\n\n* A flaw was found in the way the KVM subsystem handled guests attempting\nto run with the X86_CR4_OSXSAVE CPU feature flag set. On hosts without the\nXSAVE CPU feature, a local, unprivileged user could use this flaw to crash\nthe host system. (The \"grep --color xsave /proc/cpuinfo\" command can be\nused to verify if your system has the XSAVE CPU feature.) (CVE-2012-4461,\nModerate)\n\n* It was found that the default SCSI command filter does not accommodate\ncommands that overlap across device classes. A privileged guest user could\npotentially use this flaw to write arbitrary data to a LUN that is\npassed-through as read-only. (CVE-2012-4542, Moderate)\n\n* A use-after-free flaw was found in the tmpfs implementation. A local user\nable to mount and unmount a tmpfs file system could use this flaw to cause\na denial of service or, potentially, escalate their privileges.\n(CVE-2013-1767, Low)\n\nRed Hat would like to thank Jon Howell for reporting CVE-2012-4461.\nCVE-2012-4542 was discovered by Paolo Bonzini of Red Hat.\n\nThis update also fixes the following bugs:\n\n* Previously, when open(2) system calls were processed, the GETATTR\nroutine did not check to see if valid attributes were also returned. As a\nresult, the open() call succeeded with invalid attributes instead of\nfailing in such a case. This update adds the missing check, and the open()\ncall succeeds only when valid attributes are returned. (BZ#960409)\n\n* Previously, the fsync(2) system call incorrectly returned the EIO\n(Input/Output) error instead of the ENOSPC (No space left on device) error.\nThis was due to incorrect error handling in the page cache. This problem\nhas been fixed and the correct error value is now returned. (BZ#960418)\n\n* In the RPC code, when a network socket backed up due to high network\ntraffic, a timer was set causing a retransmission, which in turn could\ncause an even larger amount of network traffic to be generated. To prevent\nthis problem, the RPC code now waits for the socket to empty instead of\nsetting the timer. (BZ#960423)\n\n* This update fixes a number of bugs in the be2iscsi driver for\nServerEngines BladeEngine 2 Open iSCSI devices. (BZ#955502)\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2013:0882",
"url": "https://access.redhat.com/errata/RHSA-2013:0882"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "862900",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=862900"
},
{
"category": "external",
"summary": "875360",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=875360"
},
{
"category": "external",
"summary": "912905",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=912905"
},
{
"category": "external",
"summary": "915592",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=915592"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_0882.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-11-21T17:43:58+00:00",
"generator": {
"date": "2025-11-21T17:43:58+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2013:0882",
"initial_release_date": "2013-05-30T18:24:00+00:00",
"revision_history": [
{
"date": "2013-05-30T18:24:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2013-05-30T18:29:49+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:43:58+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server EUS (v. 6.2)",
"product": {
"name": "Red Hat Enterprise Linux Server EUS (v. 6.2)",
"product_id": "6Server-6.2.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:6.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 6.2)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 6.2)",
"product_id": "6Server-optional-6.2.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:6.2::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-220.38.1.el6.i686",
"product": {
"name": "kernel-debuginfo-0:2.6.32-220.38.1.el6.i686",
"product_id": "kernel-debuginfo-0:2.6.32-220.38.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-220.38.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-220.38.1.el6.i686",
"product": {
"name": "python-perf-0:2.6.32-220.38.1.el6.i686",
"product_id": "python-perf-0:2.6.32-220.38.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-220.38.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-220.38.1.el6.i686",
"product": {
"name": "perf-debuginfo-0:2.6.32-220.38.1.el6.i686",
"product_id": "perf-debuginfo-0:2.6.32-220.38.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-220.38.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-i686-0:2.6.32-220.38.1.el6.i686",
"product": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-220.38.1.el6.i686",
"product_id": "kernel-debuginfo-common-i686-0:2.6.32-220.38.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-i686@2.6.32-220.38.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.i686",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.i686",
"product_id": "kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-220.38.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-220.38.1.el6.i686",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-220.38.1.el6.i686",
"product_id": "python-perf-debuginfo-0:2.6.32-220.38.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-220.38.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-220.38.1.el6.i686",
"product": {
"name": "perf-0:2.6.32-220.38.1.el6.i686",
"product_id": "perf-0:2.6.32-220.38.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-220.38.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-220.38.1.el6.i686",
"product": {
"name": "kernel-debug-0:2.6.32-220.38.1.el6.i686",
"product_id": "kernel-debug-0:2.6.32-220.38.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-220.38.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-220.38.1.el6.i686",
"product": {
"name": "kernel-headers-0:2.6.32-220.38.1.el6.i686",
"product_id": "kernel-headers-0:2.6.32-220.38.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-220.38.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-220.38.1.el6.i686",
"product": {
"name": "kernel-debug-devel-0:2.6.32-220.38.1.el6.i686",
"product_id": "kernel-debug-devel-0:2.6.32-220.38.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-220.38.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-220.38.1.el6.i686",
"product": {
"name": "kernel-devel-0:2.6.32-220.38.1.el6.i686",
"product_id": "kernel-devel-0:2.6.32-220.38.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-220.38.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-220.38.1.el6.i686",
"product": {
"name": "kernel-0:2.6.32-220.38.1.el6.i686",
"product_id": "kernel-0:2.6.32-220.38.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-220.38.1.el6?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"product_id": "kernel-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-220.38.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-220.38.1.el6.ppc64",
"product": {
"name": "python-perf-0:2.6.32-220.38.1.el6.ppc64",
"product_id": "python-perf-0:2.6.32-220.38.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-220.38.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"product": {
"name": "perf-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"product_id": "perf-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-220.38.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-220.38.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"product_id": "python-perf-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-220.38.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-220.38.1.el6.ppc64",
"product": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-220.38.1.el6.ppc64",
"product_id": "kernel-debuginfo-common-ppc64-0:2.6.32-220.38.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@2.6.32-220.38.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-220.38.1.el6.ppc64",
"product": {
"name": "perf-0:2.6.32-220.38.1.el6.ppc64",
"product_id": "perf-0:2.6.32-220.38.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-220.38.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-220.38.1.el6.ppc64",
"product": {
"name": "kernel-debug-0:2.6.32-220.38.1.el6.ppc64",
"product_id": "kernel-debug-0:2.6.32-220.38.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-220.38.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-220.38.1.el6.ppc64",
"product": {
"name": "kernel-headers-0:2.6.32-220.38.1.el6.ppc64",
"product_id": "kernel-headers-0:2.6.32-220.38.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-220.38.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-220.38.1.el6.ppc64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-220.38.1.el6.ppc64",
"product_id": "kernel-debug-devel-0:2.6.32-220.38.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-220.38.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-220.38.1.el6.ppc64",
"product": {
"name": "kernel-devel-0:2.6.32-220.38.1.el6.ppc64",
"product_id": "kernel-devel-0:2.6.32-220.38.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-220.38.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:2.6.32-220.38.1.el6.ppc64",
"product": {
"name": "kernel-bootwrapper-0:2.6.32-220.38.1.el6.ppc64",
"product_id": "kernel-bootwrapper-0:2.6.32-220.38.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@2.6.32-220.38.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-220.38.1.el6.ppc64",
"product": {
"name": "kernel-0:2.6.32-220.38.1.el6.ppc64",
"product_id": "kernel-0:2.6.32-220.38.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-220.38.1.el6?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"product_id": "kernel-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-220.38.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-220.38.1.el6.x86_64",
"product": {
"name": "python-perf-0:2.6.32-220.38.1.el6.x86_64",
"product_id": "python-perf-0:2.6.32-220.38.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-220.38.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-220.38.1.el6.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-220.38.1.el6.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-220.38.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-220.38.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"product": {
"name": "perf-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"product_id": "perf-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-220.38.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-220.38.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"product_id": "python-perf-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-220.38.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-220.38.1.el6.x86_64",
"product": {
"name": "perf-0:2.6.32-220.38.1.el6.x86_64",
"product_id": "perf-0:2.6.32-220.38.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-220.38.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-220.38.1.el6.x86_64",
"product": {
"name": "kernel-debug-0:2.6.32-220.38.1.el6.x86_64",
"product_id": "kernel-debug-0:2.6.32-220.38.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-220.38.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-220.38.1.el6.x86_64",
"product": {
"name": "kernel-headers-0:2.6.32-220.38.1.el6.x86_64",
"product_id": "kernel-headers-0:2.6.32-220.38.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-220.38.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-220.38.1.el6.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-220.38.1.el6.x86_64",
"product_id": "kernel-debug-devel-0:2.6.32-220.38.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-220.38.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-220.38.1.el6.x86_64",
"product": {
"name": "kernel-devel-0:2.6.32-220.38.1.el6.x86_64",
"product_id": "kernel-devel-0:2.6.32-220.38.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-220.38.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-220.38.1.el6.x86_64",
"product": {
"name": "kernel-0:2.6.32-220.38.1.el6.x86_64",
"product_id": "kernel-0:2.6.32-220.38.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-220.38.1.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"product": {
"name": "kernel-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"product_id": "kernel-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-220.38.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"product_id": "kernel-kdump-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.32-220.38.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-220.38.1.el6.s390x",
"product": {
"name": "python-perf-0:2.6.32-220.38.1.el6.s390x",
"product_id": "python-perf-0:2.6.32-220.38.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-220.38.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"product": {
"name": "perf-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"product_id": "perf-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-220.38.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:2.6.32-220.38.1.el6.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-220.38.1.el6.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:2.6.32-220.38.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@2.6.32-220.38.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"product_id": "kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-220.38.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"product_id": "python-perf-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-220.38.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-220.38.1.el6.s390x",
"product": {
"name": "perf-0:2.6.32-220.38.1.el6.s390x",
"product_id": "perf-0:2.6.32-220.38.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-220.38.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-220.38.1.el6.s390x",
"product": {
"name": "kernel-debug-0:2.6.32-220.38.1.el6.s390x",
"product_id": "kernel-debug-0:2.6.32-220.38.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-220.38.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-220.38.1.el6.s390x",
"product": {
"name": "kernel-headers-0:2.6.32-220.38.1.el6.s390x",
"product_id": "kernel-headers-0:2.6.32-220.38.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-220.38.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-220.38.1.el6.s390x",
"product": {
"name": "kernel-debug-devel-0:2.6.32-220.38.1.el6.s390x",
"product_id": "kernel-debug-devel-0:2.6.32-220.38.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-220.38.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-220.38.1.el6.s390x",
"product": {
"name": "kernel-devel-0:2.6.32-220.38.1.el6.s390x",
"product_id": "kernel-devel-0:2.6.32-220.38.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-220.38.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:2.6.32-220.38.1.el6.s390x",
"product": {
"name": "kernel-kdump-0:2.6.32-220.38.1.el6.s390x",
"product_id": "kernel-kdump-0:2.6.32-220.38.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@2.6.32-220.38.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:2.6.32-220.38.1.el6.s390x",
"product": {
"name": "kernel-kdump-devel-0:2.6.32-220.38.1.el6.s390x",
"product_id": "kernel-kdump-devel-0:2.6.32-220.38.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.32-220.38.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-220.38.1.el6.s390x",
"product": {
"name": "kernel-0:2.6.32-220.38.1.el6.s390x",
"product_id": "kernel-0:2.6.32-220.38.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-220.38.1.el6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-220.38.1.el6.src",
"product": {
"name": "kernel-0:2.6.32-220.38.1.el6.src",
"product_id": "kernel-0:2.6.32-220.38.1.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-220.38.1.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-0:2.6.32-220.38.1.el6.noarch",
"product": {
"name": "kernel-firmware-0:2.6.32-220.38.1.el6.noarch",
"product_id": "kernel-firmware-0:2.6.32-220.38.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-220.38.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:2.6.32-220.38.1.el6.noarch",
"product": {
"name": "kernel-doc-0:2.6.32-220.38.1.el6.noarch",
"product_id": "kernel-doc-0:2.6.32-220.38.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.32-220.38.1.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-220.38.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.2)",
"product_id": "6Server-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.i686"
},
"product_reference": "kernel-0:2.6.32-220.38.1.el6.i686",
"relates_to_product_reference": "6Server-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-220.38.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.2)",
"product_id": "6Server-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-220.38.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-220.38.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.2)",
"product_id": "6Server-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-220.38.1.el6.s390x",
"relates_to_product_reference": "6Server-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-220.38.1.el6.src as a component of Red Hat Enterprise Linux Server EUS (v. 6.2)",
"product_id": "6Server-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-220.38.1.el6.src",
"relates_to_product_reference": "6Server-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-220.38.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.2)",
"product_id": "6Server-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-220.38.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-220.38.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.2)",
"product_id": "6Server-6.2.EUS:kernel-bootwrapper-0:2.6.32-220.38.1.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-220.38.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-220.38.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.2)",
"product_id": "6Server-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-220.38.1.el6.i686",
"relates_to_product_reference": "6Server-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-220.38.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.2)",
"product_id": "6Server-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-220.38.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-220.38.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.2)",
"product_id": "6Server-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-220.38.1.el6.s390x",
"relates_to_product_reference": "6Server-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-220.38.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.2)",
"product_id": "6Server-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-220.38.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.2)",
"product_id": "6Server-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.i686",
"relates_to_product_reference": "6Server-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.2)",
"product_id": "6Server-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.2)",
"product_id": "6Server-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"relates_to_product_reference": "6Server-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.2)",
"product_id": "6Server-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-220.38.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.2)",
"product_id": "6Server-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-220.38.1.el6.i686",
"relates_to_product_reference": "6Server-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-220.38.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.2)",
"product_id": "6Server-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-220.38.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-220.38.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.2)",
"product_id": "6Server-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-220.38.1.el6.s390x",
"relates_to_product_reference": "6Server-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-220.38.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.2)",
"product_id": "6Server-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-220.38.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-220.38.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.2)",
"product_id": "6Server-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-220.38.1.el6.i686",
"relates_to_product_reference": "6Server-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-220.38.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.2)",
"product_id": "6Server-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-220.38.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.2)",
"product_id": "6Server-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"relates_to_product_reference": "6Server-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-220.38.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.2)",
"product_id": "6Server-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-220.38.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.2)",
"product_id": "6Server-6.2.EUS:kernel-debuginfo-common-i686-0:2.6.32-220.38.1.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-220.38.1.el6.i686",
"relates_to_product_reference": "6Server-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-220.38.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.2)",
"product_id": "6Server-6.2.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-220.38.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-220.38.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-220.38.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.2)",
"product_id": "6Server-6.2.EUS:kernel-debuginfo-common-s390x-0:2.6.32-220.38.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-220.38.1.el6.s390x",
"relates_to_product_reference": "6Server-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-220.38.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.2)",
"product_id": "6Server-6.2.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.38.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-220.38.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-220.38.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.2)",
"product_id": "6Server-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-220.38.1.el6.i686",
"relates_to_product_reference": "6Server-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-220.38.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.2)",
"product_id": "6Server-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-220.38.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-220.38.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.2)",
"product_id": "6Server-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-220.38.1.el6.s390x",
"relates_to_product_reference": "6Server-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-220.38.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.2)",
"product_id": "6Server-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-220.38.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-220.38.1.el6.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 6.2)",
"product_id": "6Server-6.2.EUS:kernel-doc-0:2.6.32-220.38.1.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-220.38.1.el6.noarch",
"relates_to_product_reference": "6Server-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-220.38.1.el6.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 6.2)",
"product_id": "6Server-6.2.EUS:kernel-firmware-0:2.6.32-220.38.1.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-220.38.1.el6.noarch",
"relates_to_product_reference": "6Server-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-220.38.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.2)",
"product_id": "6Server-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-220.38.1.el6.i686",
"relates_to_product_reference": "6Server-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-220.38.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.2)",
"product_id": "6Server-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-220.38.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-220.38.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.2)",
"product_id": "6Server-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-220.38.1.el6.s390x",
"relates_to_product_reference": "6Server-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-220.38.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.2)",
"product_id": "6Server-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-220.38.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-220.38.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.2)",
"product_id": "6Server-6.2.EUS:kernel-kdump-0:2.6.32-220.38.1.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-220.38.1.el6.s390x",
"relates_to_product_reference": "6Server-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-220.38.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.2)",
"product_id": "6Server-6.2.EUS:kernel-kdump-debuginfo-0:2.6.32-220.38.1.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"relates_to_product_reference": "6Server-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-220.38.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.2)",
"product_id": "6Server-6.2.EUS:kernel-kdump-devel-0:2.6.32-220.38.1.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-220.38.1.el6.s390x",
"relates_to_product_reference": "6Server-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-220.38.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.2)",
"product_id": "6Server-6.2.EUS:perf-0:2.6.32-220.38.1.el6.i686"
},
"product_reference": "perf-0:2.6.32-220.38.1.el6.i686",
"relates_to_product_reference": "6Server-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-220.38.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.2)",
"product_id": "6Server-6.2.EUS:perf-0:2.6.32-220.38.1.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-220.38.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-220.38.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.2)",
"product_id": "6Server-6.2.EUS:perf-0:2.6.32-220.38.1.el6.s390x"
},
"product_reference": "perf-0:2.6.32-220.38.1.el6.s390x",
"relates_to_product_reference": "6Server-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-220.38.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.2)",
"product_id": "6Server-6.2.EUS:perf-0:2.6.32-220.38.1.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-220.38.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-220.38.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.2)",
"product_id": "6Server-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-220.38.1.el6.i686",
"relates_to_product_reference": "6Server-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-220.38.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.2)",
"product_id": "6Server-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-220.38.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.2)",
"product_id": "6Server-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"relates_to_product_reference": "6Server-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-220.38.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.2)",
"product_id": "6Server-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-220.38.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.2)",
"product_id": "6Server-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-220.38.1.el6.i686",
"relates_to_product_reference": "6Server-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-220.38.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.2)",
"product_id": "6Server-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-220.38.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-220.38.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.2)",
"product_id": "6Server-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-220.38.1.el6.s390x",
"relates_to_product_reference": "6Server-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-220.38.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.2)",
"product_id": "6Server-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-220.38.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-220.38.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.2)",
"product_id": "6Server-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-220.38.1.el6.i686",
"relates_to_product_reference": "6Server-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-220.38.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.2)",
"product_id": "6Server-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-220.38.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.2)",
"product_id": "6Server-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"relates_to_product_reference": "6Server-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-220.38.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.2)",
"product_id": "6Server-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-220.38.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.2)",
"product_id": "6Server-optional-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.i686"
},
"product_reference": "kernel-0:2.6.32-220.38.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-220.38.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.2)",
"product_id": "6Server-optional-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-220.38.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-220.38.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.2)",
"product_id": "6Server-optional-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-220.38.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-220.38.1.el6.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.2)",
"product_id": "6Server-optional-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-220.38.1.el6.src",
"relates_to_product_reference": "6Server-optional-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-220.38.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.2)",
"product_id": "6Server-optional-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-220.38.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-220.38.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.2)",
"product_id": "6Server-optional-6.2.EUS:kernel-bootwrapper-0:2.6.32-220.38.1.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-220.38.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-220.38.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.2)",
"product_id": "6Server-optional-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-220.38.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-220.38.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.2)",
"product_id": "6Server-optional-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-220.38.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-220.38.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.2)",
"product_id": "6Server-optional-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-220.38.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-220.38.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.2)",
"product_id": "6Server-optional-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-220.38.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.2)",
"product_id": "6Server-optional-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.2)",
"product_id": "6Server-optional-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.2)",
"product_id": "6Server-optional-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.2)",
"product_id": "6Server-optional-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-220.38.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.2)",
"product_id": "6Server-optional-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-220.38.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-220.38.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.2)",
"product_id": "6Server-optional-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-220.38.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-220.38.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.2)",
"product_id": "6Server-optional-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-220.38.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-220.38.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.2)",
"product_id": "6Server-optional-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-220.38.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-220.38.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.2)",
"product_id": "6Server-optional-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-220.38.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-220.38.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.2)",
"product_id": "6Server-optional-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-220.38.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.2)",
"product_id": "6Server-optional-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-220.38.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.2)",
"product_id": "6Server-optional-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-220.38.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.2)",
"product_id": "6Server-optional-6.2.EUS:kernel-debuginfo-common-i686-0:2.6.32-220.38.1.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-220.38.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-220.38.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.2)",
"product_id": "6Server-optional-6.2.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-220.38.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-220.38.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-220.38.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.2)",
"product_id": "6Server-optional-6.2.EUS:kernel-debuginfo-common-s390x-0:2.6.32-220.38.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-220.38.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-220.38.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.2)",
"product_id": "6Server-optional-6.2.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.38.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-220.38.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-220.38.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.2)",
"product_id": "6Server-optional-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-220.38.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-220.38.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.2)",
"product_id": "6Server-optional-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-220.38.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-220.38.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.2)",
"product_id": "6Server-optional-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-220.38.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-220.38.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.2)",
"product_id": "6Server-optional-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-220.38.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-220.38.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.2)",
"product_id": "6Server-optional-6.2.EUS:kernel-doc-0:2.6.32-220.38.1.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-220.38.1.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-220.38.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.2)",
"product_id": "6Server-optional-6.2.EUS:kernel-firmware-0:2.6.32-220.38.1.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-220.38.1.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-220.38.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.2)",
"product_id": "6Server-optional-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-220.38.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-220.38.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.2)",
"product_id": "6Server-optional-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-220.38.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-220.38.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.2)",
"product_id": "6Server-optional-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-220.38.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-220.38.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.2)",
"product_id": "6Server-optional-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-220.38.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-220.38.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.2)",
"product_id": "6Server-optional-6.2.EUS:kernel-kdump-0:2.6.32-220.38.1.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-220.38.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-220.38.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.2)",
"product_id": "6Server-optional-6.2.EUS:kernel-kdump-debuginfo-0:2.6.32-220.38.1.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-220.38.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.2)",
"product_id": "6Server-optional-6.2.EUS:kernel-kdump-devel-0:2.6.32-220.38.1.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-220.38.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-220.38.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.2)",
"product_id": "6Server-optional-6.2.EUS:perf-0:2.6.32-220.38.1.el6.i686"
},
"product_reference": "perf-0:2.6.32-220.38.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-220.38.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.2)",
"product_id": "6Server-optional-6.2.EUS:perf-0:2.6.32-220.38.1.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-220.38.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-220.38.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.2)",
"product_id": "6Server-optional-6.2.EUS:perf-0:2.6.32-220.38.1.el6.s390x"
},
"product_reference": "perf-0:2.6.32-220.38.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-220.38.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.2)",
"product_id": "6Server-optional-6.2.EUS:perf-0:2.6.32-220.38.1.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-220.38.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-220.38.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.2)",
"product_id": "6Server-optional-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-220.38.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-220.38.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.2)",
"product_id": "6Server-optional-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-220.38.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.2)",
"product_id": "6Server-optional-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-220.38.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.2)",
"product_id": "6Server-optional-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-220.38.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.2)",
"product_id": "6Server-optional-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-220.38.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-220.38.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.2)",
"product_id": "6Server-optional-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-220.38.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-220.38.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.2)",
"product_id": "6Server-optional-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-220.38.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-220.38.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.2)",
"product_id": "6Server-optional-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-220.38.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-220.38.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.2)",
"product_id": "6Server-optional-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-220.38.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-220.38.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.2)",
"product_id": "6Server-optional-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-220.38.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.2)",
"product_id": "6Server-optional-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-220.38.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.2)",
"product_id": "6Server-optional-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.2.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jon Howell"
]
}
],
"cve": "CVE-2012-4461",
"discovery_date": "2012-09-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "862900"
}
],
"notes": [
{
"category": "description",
"text": "The KVM subsystem in the Linux kernel before 3.6.9, when running on hosts that use qemu userspace without XSAVE, allows local users to cause a denial of service (kernel OOPS) by using the KVM_SET_SREGS ioctl to set the X86_CR4_OSXSAVE bit in the guest cr4 register, then calling the KVM_RUN ioctl.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: kvm: invalid opcode oops on SET_SREGS with OSXSAVE bit set",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the version of Linux kernel as shipped with Red Hat Enterprise Linux 5.\n\nThis issue did affect the version of Linux kernel as shipped with Red Hat Enterprise Linux 6.\n\nThis issue did not affect the version of Linux kernel as shipped with Red Hat Enterprise MRG 2.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.src",
"6Server-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-bootwrapper-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-debuginfo-common-i686-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-debuginfo-common-s390x-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-doc-0:2.6.32-220.38.1.el6.noarch",
"6Server-6.2.EUS:kernel-firmware-0:2.6.32-220.38.1.el6.noarch",
"6Server-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-kdump-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-kdump-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-kdump-devel-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:perf-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:perf-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:perf-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:perf-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.src",
"6Server-optional-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-bootwrapper-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-debuginfo-common-i686-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-debuginfo-common-s390x-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-doc-0:2.6.32-220.38.1.el6.noarch",
"6Server-optional-6.2.EUS:kernel-firmware-0:2.6.32-220.38.1.el6.noarch",
"6Server-optional-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-kdump-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-kdump-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-kdump-devel-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:perf-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:perf-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:perf-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:perf-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-4461"
},
{
"category": "external",
"summary": "RHBZ#862900",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=862900"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-4461",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4461"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-4461",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-4461"
}
],
"release_date": "2012-11-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-05-30T18:24:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"6Server-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.src",
"6Server-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-bootwrapper-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-debuginfo-common-i686-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-debuginfo-common-s390x-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-doc-0:2.6.32-220.38.1.el6.noarch",
"6Server-6.2.EUS:kernel-firmware-0:2.6.32-220.38.1.el6.noarch",
"6Server-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-kdump-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-kdump-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-kdump-devel-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:perf-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:perf-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:perf-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:perf-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.src",
"6Server-optional-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-bootwrapper-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-debuginfo-common-i686-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-debuginfo-common-s390x-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-doc-0:2.6.32-220.38.1.el6.noarch",
"6Server-optional-6.2.EUS:kernel-firmware-0:2.6.32-220.38.1.el6.noarch",
"6Server-optional-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-kdump-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-kdump-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-kdump-devel-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:perf-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:perf-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:perf-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:perf-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2013:0882"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 4.7,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"products": [
"6Server-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.src",
"6Server-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-bootwrapper-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-debuginfo-common-i686-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-debuginfo-common-s390x-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-doc-0:2.6.32-220.38.1.el6.noarch",
"6Server-6.2.EUS:kernel-firmware-0:2.6.32-220.38.1.el6.noarch",
"6Server-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-kdump-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-kdump-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-kdump-devel-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:perf-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:perf-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:perf-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:perf-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.src",
"6Server-optional-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-bootwrapper-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-debuginfo-common-i686-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-debuginfo-common-s390x-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-doc-0:2.6.32-220.38.1.el6.noarch",
"6Server-optional-6.2.EUS:kernel-firmware-0:2.6.32-220.38.1.el6.noarch",
"6Server-optional-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-kdump-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-kdump-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-kdump-devel-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:perf-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:perf-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:perf-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:perf-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: kvm: invalid opcode oops on SET_SREGS with OSXSAVE bit set"
},
{
"acknowledgments": [
{
"names": [
"Paolo Bonzini"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2012-4542",
"discovery_date": "2012-10-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "875360"
}
],
"notes": [
{
"category": "description",
"text": "block/scsi_ioctl.c in the Linux kernel through 3.8 does not properly consider the SCSI device class during authorization of SCSI commands, which allows local users to bypass intended access restrictions via an SG_IO ioctl call that leverages overlapping opcodes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: block: default SCSI command filter does not accomodate commands overlap across device classes",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 7. Due to the lack of upstream patches and the Moderate impact, we are not planning to address this issue in Red Hat Enterprise Linux 7.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.src",
"6Server-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-bootwrapper-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-debuginfo-common-i686-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-debuginfo-common-s390x-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-doc-0:2.6.32-220.38.1.el6.noarch",
"6Server-6.2.EUS:kernel-firmware-0:2.6.32-220.38.1.el6.noarch",
"6Server-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-kdump-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-kdump-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-kdump-devel-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:perf-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:perf-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:perf-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:perf-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.src",
"6Server-optional-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-bootwrapper-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-debuginfo-common-i686-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-debuginfo-common-s390x-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-doc-0:2.6.32-220.38.1.el6.noarch",
"6Server-optional-6.2.EUS:kernel-firmware-0:2.6.32-220.38.1.el6.noarch",
"6Server-optional-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-kdump-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-kdump-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-kdump-devel-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:perf-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:perf-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:perf-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:perf-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-4542"
},
{
"category": "external",
"summary": "RHBZ#875360",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=875360"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-4542",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4542"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-4542",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-4542"
}
],
"release_date": "2013-01-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-05-30T18:24:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"6Server-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.src",
"6Server-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-bootwrapper-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-debuginfo-common-i686-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-debuginfo-common-s390x-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-doc-0:2.6.32-220.38.1.el6.noarch",
"6Server-6.2.EUS:kernel-firmware-0:2.6.32-220.38.1.el6.noarch",
"6Server-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-kdump-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-kdump-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-kdump-devel-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:perf-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:perf-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:perf-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:perf-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.src",
"6Server-optional-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-bootwrapper-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-debuginfo-common-i686-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-debuginfo-common-s390x-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-doc-0:2.6.32-220.38.1.el6.noarch",
"6Server-optional-6.2.EUS:kernel-firmware-0:2.6.32-220.38.1.el6.noarch",
"6Server-optional-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-kdump-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-kdump-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-kdump-devel-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:perf-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:perf-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:perf-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:perf-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2013:0882"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "ADJACENT_NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.9,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:A/AC:M/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"6Server-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.src",
"6Server-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-bootwrapper-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-debuginfo-common-i686-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-debuginfo-common-s390x-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-doc-0:2.6.32-220.38.1.el6.noarch",
"6Server-6.2.EUS:kernel-firmware-0:2.6.32-220.38.1.el6.noarch",
"6Server-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-kdump-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-kdump-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-kdump-devel-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:perf-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:perf-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:perf-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:perf-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.src",
"6Server-optional-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-bootwrapper-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-debuginfo-common-i686-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-debuginfo-common-s390x-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-doc-0:2.6.32-220.38.1.el6.noarch",
"6Server-optional-6.2.EUS:kernel-firmware-0:2.6.32-220.38.1.el6.noarch",
"6Server-optional-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-kdump-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-kdump-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-kdump-devel-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:perf-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:perf-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:perf-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:perf-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: block: default SCSI command filter does not accomodate commands overlap across device classes"
},
{
"cve": "CVE-2013-0311",
"discovery_date": "2013-02-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "912905"
}
],
"notes": [
{
"category": "description",
"text": "The translate_desc function in drivers/vhost/vhost.c in the Linux kernel before 3.7 does not properly handle cross-region descriptors, which allows guest OS users to obtain host OS privileges by leveraging KVM guest OS privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: vhost: fix length for cross region descriptor",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did affect the version of Linux kernel as shipped with Red Hat Enterprise Linux 6.\n\nThis issue did not affect the version of Linux kernel as shipped with Red Hat Enterprise Linux 5 and Red Hat Enterprise MRG 2.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.src",
"6Server-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-bootwrapper-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-debuginfo-common-i686-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-debuginfo-common-s390x-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-doc-0:2.6.32-220.38.1.el6.noarch",
"6Server-6.2.EUS:kernel-firmware-0:2.6.32-220.38.1.el6.noarch",
"6Server-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-kdump-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-kdump-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-kdump-devel-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:perf-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:perf-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:perf-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:perf-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.src",
"6Server-optional-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-bootwrapper-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-debuginfo-common-i686-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-debuginfo-common-s390x-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-doc-0:2.6.32-220.38.1.el6.noarch",
"6Server-optional-6.2.EUS:kernel-firmware-0:2.6.32-220.38.1.el6.noarch",
"6Server-optional-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-kdump-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-kdump-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-kdump-devel-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:perf-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:perf-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:perf-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:perf-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0311"
},
{
"category": "external",
"summary": "RHBZ#912905",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=912905"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0311",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0311"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0311",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0311"
}
],
"release_date": "2013-02-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-05-30T18:24:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"6Server-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.src",
"6Server-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-bootwrapper-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-debuginfo-common-i686-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-debuginfo-common-s390x-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-doc-0:2.6.32-220.38.1.el6.noarch",
"6Server-6.2.EUS:kernel-firmware-0:2.6.32-220.38.1.el6.noarch",
"6Server-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-kdump-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-kdump-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-kdump-devel-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:perf-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:perf-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:perf-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:perf-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.src",
"6Server-optional-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-bootwrapper-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-debuginfo-common-i686-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-debuginfo-common-s390x-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-doc-0:2.6.32-220.38.1.el6.noarch",
"6Server-optional-6.2.EUS:kernel-firmware-0:2.6.32-220.38.1.el6.noarch",
"6Server-optional-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-kdump-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-kdump-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-kdump-devel-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:perf-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:perf-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:perf-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:perf-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2013:0882"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "ADJACENT_NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.5,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:A/AC:H/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
"products": [
"6Server-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.src",
"6Server-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-bootwrapper-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-debuginfo-common-i686-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-debuginfo-common-s390x-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-doc-0:2.6.32-220.38.1.el6.noarch",
"6Server-6.2.EUS:kernel-firmware-0:2.6.32-220.38.1.el6.noarch",
"6Server-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-kdump-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-kdump-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-kdump-devel-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:perf-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:perf-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:perf-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:perf-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.src",
"6Server-optional-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-bootwrapper-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-debuginfo-common-i686-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-debuginfo-common-s390x-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-doc-0:2.6.32-220.38.1.el6.noarch",
"6Server-optional-6.2.EUS:kernel-firmware-0:2.6.32-220.38.1.el6.noarch",
"6Server-optional-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-kdump-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-kdump-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-kdump-devel-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:perf-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:perf-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:perf-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:perf-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: vhost: fix length for cross region descriptor"
},
{
"cve": "CVE-2013-1767",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2013-02-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "915592"
}
],
"notes": [
{
"category": "description",
"text": "Use-after-free vulnerability in the shmem_remount_fs function in mm/shmem.c in the Linux kernel before 3.7.10 allows local users to gain privileges or cause a denial of service (system crash) by remounting a tmpfs filesystem without specifying a required mpol (aka mempolicy) mount option.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tmpfs: fix use-after-free of mempolicy object",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect the versions of the kernel package as shipped with Red Hat Enterprise Linux 5.\n\nThis issue affects the version of Linux kernel as shipped with Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG 2.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.src",
"6Server-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-bootwrapper-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-debuginfo-common-i686-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-debuginfo-common-s390x-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-doc-0:2.6.32-220.38.1.el6.noarch",
"6Server-6.2.EUS:kernel-firmware-0:2.6.32-220.38.1.el6.noarch",
"6Server-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-kdump-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-kdump-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-kdump-devel-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:perf-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:perf-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:perf-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:perf-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.src",
"6Server-optional-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-bootwrapper-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-debuginfo-common-i686-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-debuginfo-common-s390x-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-doc-0:2.6.32-220.38.1.el6.noarch",
"6Server-optional-6.2.EUS:kernel-firmware-0:2.6.32-220.38.1.el6.noarch",
"6Server-optional-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-kdump-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-kdump-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-kdump-devel-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:perf-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:perf-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:perf-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:perf-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1767"
},
{
"category": "external",
"summary": "RHBZ#915592",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=915592"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1767",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1767"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1767",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1767"
}
],
"release_date": "2013-02-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-05-30T18:24:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"6Server-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.src",
"6Server-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-bootwrapper-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-debuginfo-common-i686-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-debuginfo-common-s390x-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-doc-0:2.6.32-220.38.1.el6.noarch",
"6Server-6.2.EUS:kernel-firmware-0:2.6.32-220.38.1.el6.noarch",
"6Server-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-kdump-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-kdump-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-kdump-devel-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:perf-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:perf-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:perf-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:perf-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.src",
"6Server-optional-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-bootwrapper-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-debuginfo-common-i686-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-debuginfo-common-s390x-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-doc-0:2.6.32-220.38.1.el6.noarch",
"6Server-optional-6.2.EUS:kernel-firmware-0:2.6.32-220.38.1.el6.noarch",
"6Server-optional-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-kdump-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-kdump-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-kdump-devel-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:perf-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:perf-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:perf-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:perf-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2013:0882"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
"products": [
"6Server-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.src",
"6Server-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-bootwrapper-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-debuginfo-common-i686-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-debuginfo-common-s390x-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-doc-0:2.6.32-220.38.1.el6.noarch",
"6Server-6.2.EUS:kernel-firmware-0:2.6.32-220.38.1.el6.noarch",
"6Server-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:kernel-kdump-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-kdump-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:kernel-kdump-devel-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:perf-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:perf-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:perf-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:perf-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.x86_64",
"6Server-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.src",
"6Server-optional-6.2.EUS:kernel-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-bootwrapper-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-debug-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-debug-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-debug-devel-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-debuginfo-common-i686-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-debuginfo-common-s390x-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-devel-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-doc-0:2.6.32-220.38.1.el6.noarch",
"6Server-optional-6.2.EUS:kernel-firmware-0:2.6.32-220.38.1.el6.noarch",
"6Server-optional-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-headers-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:kernel-kdump-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-kdump-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:kernel-kdump-devel-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:perf-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:perf-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:perf-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:perf-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:perf-debuginfo-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:python-perf-0:2.6.32-220.38.1.el6.x86_64",
"6Server-optional-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.i686",
"6Server-optional-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.ppc64",
"6Server-optional-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.s390x",
"6Server-optional-6.2.EUS:python-perf-debuginfo-0:2.6.32-220.38.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Kernel: tmpfs: fix use-after-free of mempolicy object"
}
]
}
RHSA-2013:0928
Vulnerability from csaf_redhat - Published: 2013-06-11 17:31 - Updated: 2025-11-21 17:44block/scsi_ioctl.c in the Linux kernel through 3.8 does not properly consider the SCSI device class during authorization of SCSI commands, which allows local users to bypass intended access restrictions via an SG_IO ioctl call that leverages overlapping opcodes.
The translate_desc function in drivers/vhost/vhost.c in the Linux kernel before 3.7 does not properly handle cross-region descriptors, which allows guest OS users to obtain host OS privileges by leveraging KVM guest OS privileges.
Use-after-free vulnerability in the shmem_remount_fs function in mm/shmem.c in the Linux kernel before 3.7.10 allows local users to gain privileges or cause a denial of service (system crash) by remounting a tmpfs filesystem without specifying a required mpol (aka mempolicy) mount option.
Buffer overflow in the VFAT filesystem implementation in the Linux kernel before 3.3 allows local users to gain privileges or cause a denial of service (system crash) via a VFAT write operation on a filesystem with the utf8 mount option, which is not properly handled during UTF-8 to UTF-16 conversion.
The kvm_set_msr_common function in arch/x86/kvm/x86.c in the Linux kernel through 3.8.4 does not ensure a required time_page alignment during an MSR_KVM_SYSTEM_TIME operation, which allows guest OS users to cause a denial of service (buffer overflow and host OS memory corruption) or possibly have unspecified other impact via a crafted application.
Use-after-free vulnerability in arch/x86/kvm/x86.c in the Linux kernel through 3.8.4 allows guest OS users to cause a denial of service (host OS memory corruption) or possibly have unspecified other impact via a crafted application that triggers use of a guest physical address (GPA) in (1) movable or (2) removable memory during an MSR_KVM_SYSTEM_TIME kvm_set_msr_common operation.
The ioapic_read_indirect function in virt/kvm/ioapic.c in the Linux kernel through 3.8.4 does not properly handle a certain combination of invalid IOAPIC_REG_SELECT and IOAPIC_REG_WINDOW operations, which allows guest OS users to obtain sensitive information from host OS memory or cause a denial of service (host OS OOPS) via a crafted application.
fs/ext3/super.c in the Linux kernel before 3.8.4 uses incorrect arguments to functions in certain circumstances related to printk input, which allows local users to conduct format-string attacks and possibly gain privileges via a crafted application.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated kernel packages that fix multiple security issues and several bugs\nare now available for Red Hat Enterprise Linux 6.3 Extended Update Support.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues:\n\n* A flaw was found in the way the vhost kernel module handled descriptors\nthat spanned multiple regions. A privileged guest user in a KVM\n(Kernel-based Virtual Machine) guest could use this flaw to crash the host\nor, potentially, escalate their privileges on the host. (CVE-2013-0311,\nImportant)\n\n* A buffer overflow flaw was found in the way UTF-8 characters were\nconverted to UTF-16 in the utf8s_to_utf16s() function of the Linux kernel\u0027s\nFAT file system implementation. A local user able to mount a FAT file\nsystem with the \"utf8=1\" option could use this flaw to crash the system or,\npotentially, to escalate their privileges. (CVE-2013-1773, Important)\n\n* A flaw was found in the way KVM handled guest time updates when the\nbuffer the guest registered by writing to the MSR_KVM_SYSTEM_TIME machine\nstate register (MSR) crossed a page boundary. A privileged guest user could\nuse this flaw to crash the host or, potentially, escalate their privileges,\nallowing them to execute arbitrary code at the host kernel level.\n(CVE-2013-1796, Important)\n\n* A potential use-after-free flaw was found in the way KVM handled guest\ntime updates when the GPA (guest physical address) the guest registered by\nwriting to the MSR_KVM_SYSTEM_TIME machine state register (MSR) fell into a\nmovable or removable memory region of the hosting user-space process (by\ndefault, QEMU-KVM) on the host. If that memory region is deregistered from\nKVM using KVM_SET_USER_MEMORY_REGION and the allocated virtual memory\nreused, a privileged guest user could potentially use this flaw to escalate\ntheir privileges on the host. (CVE-2013-1797, Important)\n\n* A flaw was found in the way KVM emulated IOAPIC (I/O Advanced\nProgrammable Interrupt Controller). A missing validation check in the\nioapic_read_indirect() function could allow a privileged guest user to\ncrash the host, or read a substantial portion of host kernel memory.\n(CVE-2013-1798, Important)\n\n* It was found that the default SCSI command filter does not accommodate\ncommands that overlap across device classes. A privileged guest user could\npotentially use this flaw to write arbitrary data to a LUN that is\npassed-through as read-only. (CVE-2012-4542, Moderate)\n\n* A use-after-free flaw was found in the tmpfs implementation. A local user\nable to mount and unmount a tmpfs file system could use this flaw to cause\na denial of service or, potentially, escalate their privileges.\n(CVE-2013-1767, Low)\n\n* A format string flaw was found in the ext3_msg() function in the Linux\nkernel\u0027s ext3 file system implementation. A local user who is able to mount\nan ext3 file system could use this flaw to cause a denial of service or,\npotentially, escalate their privileges. (CVE-2013-1848, Low)\n\nRed Hat would like to thank Andrew Honig of Google for reporting the\nCVE-2013-1796, CVE-2013-1797, and CVE-2013-1798 issues. The CVE-2012-4542\nissue was discovered by Paolo Bonzini of Red Hat.\n\nThis update also fixes several bugs. Documentation for these changes will\nbe available shortly from the Technical Notes document linked to in the\nReferences section.\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2013:0928",
"url": "https://access.redhat.com/errata/RHSA-2013:0928"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/6.3_Technical_Notes/kernel.html",
"url": "https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/6.3_Technical_Notes/kernel.html"
},
{
"category": "external",
"summary": "875360",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=875360"
},
{
"category": "external",
"summary": "912905",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=912905"
},
{
"category": "external",
"summary": "915592",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=915592"
},
{
"category": "external",
"summary": "916115",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=916115"
},
{
"category": "external",
"summary": "917012",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=917012"
},
{
"category": "external",
"summary": "917013",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=917013"
},
{
"category": "external",
"summary": "917017",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=917017"
},
{
"category": "external",
"summary": "920783",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=920783"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_0928.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-11-21T17:44:07+00:00",
"generator": {
"date": "2025-11-21T17:44:07+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2013:0928",
"initial_release_date": "2013-06-11T17:31:00+00:00",
"revision_history": [
{
"date": "2013-06-11T17:31:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2013-06-11T17:37:17+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:44:07+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server EUS (v. 6.3)",
"product": {
"name": "Red Hat Enterprise Linux Server EUS (v. 6.3)",
"product_id": "6Server-6.3.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:6.3::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 6.3)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 6.3)",
"product_id": "6Server-optional-6.3.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:6.3::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "perf-0:2.6.32-279.31.1.el6.x86_64",
"product": {
"name": "perf-0:2.6.32-279.31.1.el6.x86_64",
"product_id": "perf-0:2.6.32-279.31.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-279.31.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-279.31.1.el6.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-279.31.1.el6.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-279.31.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-279.31.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-279.31.1.el6.x86_64",
"product": {
"name": "kernel-0:2.6.32-279.31.1.el6.x86_64",
"product_id": "kernel-0:2.6.32-279.31.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-279.31.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"product_id": "kernel-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-279.31.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-279.31.1.el6.x86_64",
"product": {
"name": "kernel-devel-0:2.6.32-279.31.1.el6.x86_64",
"product_id": "kernel-devel-0:2.6.32-279.31.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-279.31.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"product_id": "python-perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-279.31.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-279.31.1.el6.x86_64",
"product": {
"name": "kernel-debug-0:2.6.32-279.31.1.el6.x86_64",
"product_id": "kernel-debug-0:2.6.32-279.31.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-279.31.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-279.31.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-279.31.1.el6.x86_64",
"product": {
"name": "kernel-headers-0:2.6.32-279.31.1.el6.x86_64",
"product_id": "kernel-headers-0:2.6.32-279.31.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-279.31.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"product": {
"name": "perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"product_id": "perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-279.31.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-279.31.1.el6.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-279.31.1.el6.x86_64",
"product_id": "kernel-debug-devel-0:2.6.32-279.31.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-279.31.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-279.31.1.el6.x86_64",
"product": {
"name": "python-perf-0:2.6.32-279.31.1.el6.x86_64",
"product_id": "python-perf-0:2.6.32-279.31.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-279.31.1.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "perf-0:2.6.32-279.31.1.el6.s390x",
"product": {
"name": "perf-0:2.6.32-279.31.1.el6.s390x",
"product_id": "perf-0:2.6.32-279.31.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-279.31.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:2.6.32-279.31.1.el6.s390x",
"product": {
"name": "kernel-kdump-0:2.6.32-279.31.1.el6.s390x",
"product_id": "kernel-kdump-0:2.6.32-279.31.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@2.6.32-279.31.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-279.31.1.el6.s390x",
"product": {
"name": "kernel-0:2.6.32-279.31.1.el6.s390x",
"product_id": "kernel-0:2.6.32-279.31.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-279.31.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:2.6.32-279.31.1.el6.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-279.31.1.el6.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:2.6.32-279.31.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@2.6.32-279.31.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"product_id": "kernel-kdump-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.32-279.31.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"product": {
"name": "kernel-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"product_id": "kernel-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-279.31.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-279.31.1.el6.s390x",
"product": {
"name": "kernel-devel-0:2.6.32-279.31.1.el6.s390x",
"product_id": "kernel-devel-0:2.6.32-279.31.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-279.31.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"product_id": "python-perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-279.31.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-279.31.1.el6.s390x",
"product": {
"name": "kernel-debug-0:2.6.32-279.31.1.el6.s390x",
"product_id": "kernel-debug-0:2.6.32-279.31.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-279.31.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"product_id": "kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-279.31.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:2.6.32-279.31.1.el6.s390x",
"product": {
"name": "kernel-kdump-devel-0:2.6.32-279.31.1.el6.s390x",
"product_id": "kernel-kdump-devel-0:2.6.32-279.31.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.32-279.31.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-279.31.1.el6.s390x",
"product": {
"name": "kernel-headers-0:2.6.32-279.31.1.el6.s390x",
"product_id": "kernel-headers-0:2.6.32-279.31.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-279.31.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"product": {
"name": "perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"product_id": "perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-279.31.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-279.31.1.el6.s390x",
"product": {
"name": "kernel-debug-devel-0:2.6.32-279.31.1.el6.s390x",
"product_id": "kernel-debug-devel-0:2.6.32-279.31.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-279.31.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-279.31.1.el6.s390x",
"product": {
"name": "python-perf-0:2.6.32-279.31.1.el6.s390x",
"product_id": "python-perf-0:2.6.32-279.31.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-279.31.1.el6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "perf-0:2.6.32-279.31.1.el6.i686",
"product": {
"name": "perf-0:2.6.32-279.31.1.el6.i686",
"product_id": "perf-0:2.6.32-279.31.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-279.31.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-279.31.1.el6.i686",
"product": {
"name": "kernel-0:2.6.32-279.31.1.el6.i686",
"product_id": "kernel-0:2.6.32-279.31.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-279.31.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-279.31.1.el6.i686",
"product": {
"name": "kernel-debuginfo-0:2.6.32-279.31.1.el6.i686",
"product_id": "kernel-debuginfo-0:2.6.32-279.31.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-279.31.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-279.31.1.el6.i686",
"product": {
"name": "kernel-devel-0:2.6.32-279.31.1.el6.i686",
"product_id": "kernel-devel-0:2.6.32-279.31.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-279.31.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"product_id": "python-perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-279.31.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-i686-0:2.6.32-279.31.1.el6.i686",
"product": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-279.31.1.el6.i686",
"product_id": "kernel-debuginfo-common-i686-0:2.6.32-279.31.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-i686@2.6.32-279.31.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-279.31.1.el6.i686",
"product": {
"name": "kernel-debug-0:2.6.32-279.31.1.el6.i686",
"product_id": "kernel-debug-0:2.6.32-279.31.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-279.31.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.i686",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.i686",
"product_id": "kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-279.31.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-279.31.1.el6.i686",
"product": {
"name": "kernel-headers-0:2.6.32-279.31.1.el6.i686",
"product_id": "kernel-headers-0:2.6.32-279.31.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-279.31.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"product": {
"name": "perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"product_id": "perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-279.31.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-279.31.1.el6.i686",
"product": {
"name": "kernel-debug-devel-0:2.6.32-279.31.1.el6.i686",
"product_id": "kernel-debug-devel-0:2.6.32-279.31.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-279.31.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-279.31.1.el6.i686",
"product": {
"name": "python-perf-0:2.6.32-279.31.1.el6.i686",
"product_id": "python-perf-0:2.6.32-279.31.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-279.31.1.el6?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "perf-0:2.6.32-279.31.1.el6.ppc64",
"product": {
"name": "perf-0:2.6.32-279.31.1.el6.ppc64",
"product_id": "perf-0:2.6.32-279.31.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-279.31.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-279.31.1.el6.ppc64",
"product": {
"name": "kernel-0:2.6.32-279.31.1.el6.ppc64",
"product_id": "kernel-0:2.6.32-279.31.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-279.31.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-279.31.1.el6.ppc64",
"product": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-279.31.1.el6.ppc64",
"product_id": "kernel-debuginfo-common-ppc64-0:2.6.32-279.31.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@2.6.32-279.31.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"product_id": "kernel-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-279.31.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-279.31.1.el6.ppc64",
"product": {
"name": "kernel-devel-0:2.6.32-279.31.1.el6.ppc64",
"product_id": "kernel-devel-0:2.6.32-279.31.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-279.31.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:2.6.32-279.31.1.el6.ppc64",
"product": {
"name": "kernel-bootwrapper-0:2.6.32-279.31.1.el6.ppc64",
"product_id": "kernel-bootwrapper-0:2.6.32-279.31.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@2.6.32-279.31.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"product_id": "python-perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-279.31.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-279.31.1.el6.ppc64",
"product": {
"name": "kernel-debug-0:2.6.32-279.31.1.el6.ppc64",
"product_id": "kernel-debug-0:2.6.32-279.31.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-279.31.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-279.31.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-279.31.1.el6.ppc64",
"product": {
"name": "kernel-headers-0:2.6.32-279.31.1.el6.ppc64",
"product_id": "kernel-headers-0:2.6.32-279.31.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-279.31.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"product": {
"name": "perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"product_id": "perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-279.31.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-279.31.1.el6.ppc64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-279.31.1.el6.ppc64",
"product_id": "kernel-debug-devel-0:2.6.32-279.31.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-279.31.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-279.31.1.el6.ppc64",
"product": {
"name": "python-perf-0:2.6.32-279.31.1.el6.ppc64",
"product_id": "python-perf-0:2.6.32-279.31.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-279.31.1.el6?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-279.31.1.el6.src",
"product": {
"name": "kernel-0:2.6.32-279.31.1.el6.src",
"product_id": "kernel-0:2.6.32-279.31.1.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-279.31.1.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-0:2.6.32-279.31.1.el6.noarch",
"product": {
"name": "kernel-firmware-0:2.6.32-279.31.1.el6.noarch",
"product_id": "kernel-firmware-0:2.6.32-279.31.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-279.31.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:2.6.32-279.31.1.el6.noarch",
"product": {
"name": "kernel-doc-0:2.6.32-279.31.1.el6.noarch",
"product_id": "kernel-doc-0:2.6.32-279.31.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.32-279.31.1.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-279.31.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)",
"product_id": "6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.i686"
},
"product_reference": "kernel-0:2.6.32-279.31.1.el6.i686",
"relates_to_product_reference": "6Server-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-279.31.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)",
"product_id": "6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-279.31.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-279.31.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)",
"product_id": "6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-279.31.1.el6.s390x",
"relates_to_product_reference": "6Server-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-279.31.1.el6.src as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)",
"product_id": "6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-279.31.1.el6.src",
"relates_to_product_reference": "6Server-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-279.31.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)",
"product_id": "6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-279.31.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-279.31.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)",
"product_id": "6Server-6.3.EUS:kernel-bootwrapper-0:2.6.32-279.31.1.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-279.31.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-279.31.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)",
"product_id": "6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-279.31.1.el6.i686",
"relates_to_product_reference": "6Server-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-279.31.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)",
"product_id": "6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-279.31.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-279.31.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)",
"product_id": "6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-279.31.1.el6.s390x",
"relates_to_product_reference": "6Server-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-279.31.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)",
"product_id": "6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-279.31.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)",
"product_id": "6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.i686",
"relates_to_product_reference": "6Server-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)",
"product_id": "6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)",
"product_id": "6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"relates_to_product_reference": "6Server-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)",
"product_id": "6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-279.31.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)",
"product_id": "6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-279.31.1.el6.i686",
"relates_to_product_reference": "6Server-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-279.31.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)",
"product_id": "6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-279.31.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-279.31.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)",
"product_id": "6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-279.31.1.el6.s390x",
"relates_to_product_reference": "6Server-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-279.31.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)",
"product_id": "6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-279.31.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-279.31.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)",
"product_id": "6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-279.31.1.el6.i686",
"relates_to_product_reference": "6Server-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-279.31.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)",
"product_id": "6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-279.31.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)",
"product_id": "6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"relates_to_product_reference": "6Server-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-279.31.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)",
"product_id": "6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-279.31.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)",
"product_id": "6Server-6.3.EUS:kernel-debuginfo-common-i686-0:2.6.32-279.31.1.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-279.31.1.el6.i686",
"relates_to_product_reference": "6Server-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-279.31.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)",
"product_id": "6Server-6.3.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-279.31.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-279.31.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-279.31.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)",
"product_id": "6Server-6.3.EUS:kernel-debuginfo-common-s390x-0:2.6.32-279.31.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-279.31.1.el6.s390x",
"relates_to_product_reference": "6Server-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-279.31.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)",
"product_id": "6Server-6.3.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-279.31.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-279.31.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-279.31.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)",
"product_id": "6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-279.31.1.el6.i686",
"relates_to_product_reference": "6Server-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-279.31.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)",
"product_id": "6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-279.31.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-279.31.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)",
"product_id": "6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-279.31.1.el6.s390x",
"relates_to_product_reference": "6Server-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-279.31.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)",
"product_id": "6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-279.31.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-279.31.1.el6.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)",
"product_id": "6Server-6.3.EUS:kernel-doc-0:2.6.32-279.31.1.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-279.31.1.el6.noarch",
"relates_to_product_reference": "6Server-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-279.31.1.el6.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)",
"product_id": "6Server-6.3.EUS:kernel-firmware-0:2.6.32-279.31.1.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-279.31.1.el6.noarch",
"relates_to_product_reference": "6Server-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-279.31.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)",
"product_id": "6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-279.31.1.el6.i686",
"relates_to_product_reference": "6Server-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-279.31.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)",
"product_id": "6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-279.31.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-279.31.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)",
"product_id": "6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-279.31.1.el6.s390x",
"relates_to_product_reference": "6Server-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-279.31.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)",
"product_id": "6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-279.31.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-279.31.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)",
"product_id": "6Server-6.3.EUS:kernel-kdump-0:2.6.32-279.31.1.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-279.31.1.el6.s390x",
"relates_to_product_reference": "6Server-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-279.31.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)",
"product_id": "6Server-6.3.EUS:kernel-kdump-debuginfo-0:2.6.32-279.31.1.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"relates_to_product_reference": "6Server-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-279.31.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)",
"product_id": "6Server-6.3.EUS:kernel-kdump-devel-0:2.6.32-279.31.1.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-279.31.1.el6.s390x",
"relates_to_product_reference": "6Server-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-279.31.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)",
"product_id": "6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.i686"
},
"product_reference": "perf-0:2.6.32-279.31.1.el6.i686",
"relates_to_product_reference": "6Server-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-279.31.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)",
"product_id": "6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-279.31.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-279.31.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)",
"product_id": "6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.s390x"
},
"product_reference": "perf-0:2.6.32-279.31.1.el6.s390x",
"relates_to_product_reference": "6Server-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-279.31.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)",
"product_id": "6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-279.31.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-279.31.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)",
"product_id": "6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"relates_to_product_reference": "6Server-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)",
"product_id": "6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-279.31.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)",
"product_id": "6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"relates_to_product_reference": "6Server-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)",
"product_id": "6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-279.31.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)",
"product_id": "6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-279.31.1.el6.i686",
"relates_to_product_reference": "6Server-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-279.31.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)",
"product_id": "6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-279.31.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-279.31.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)",
"product_id": "6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-279.31.1.el6.s390x",
"relates_to_product_reference": "6Server-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-279.31.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)",
"product_id": "6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-279.31.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-279.31.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)",
"product_id": "6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"relates_to_product_reference": "6Server-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)",
"product_id": "6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-279.31.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)",
"product_id": "6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"relates_to_product_reference": "6Server-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)",
"product_id": "6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-279.31.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)",
"product_id": "6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.i686"
},
"product_reference": "kernel-0:2.6.32-279.31.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-279.31.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)",
"product_id": "6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-279.31.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-279.31.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)",
"product_id": "6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-279.31.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-279.31.1.el6.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)",
"product_id": "6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-279.31.1.el6.src",
"relates_to_product_reference": "6Server-optional-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-279.31.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)",
"product_id": "6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-279.31.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-279.31.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)",
"product_id": "6Server-optional-6.3.EUS:kernel-bootwrapper-0:2.6.32-279.31.1.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-279.31.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-279.31.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)",
"product_id": "6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-279.31.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-279.31.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)",
"product_id": "6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-279.31.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-279.31.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)",
"product_id": "6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-279.31.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-279.31.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)",
"product_id": "6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-279.31.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)",
"product_id": "6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)",
"product_id": "6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)",
"product_id": "6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)",
"product_id": "6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-279.31.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)",
"product_id": "6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-279.31.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-279.31.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)",
"product_id": "6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-279.31.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-279.31.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)",
"product_id": "6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-279.31.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-279.31.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)",
"product_id": "6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-279.31.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-279.31.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)",
"product_id": "6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-279.31.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-279.31.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)",
"product_id": "6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-279.31.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)",
"product_id": "6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-279.31.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)",
"product_id": "6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-279.31.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)",
"product_id": "6Server-optional-6.3.EUS:kernel-debuginfo-common-i686-0:2.6.32-279.31.1.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-279.31.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-279.31.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)",
"product_id": "6Server-optional-6.3.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-279.31.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-279.31.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-279.31.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)",
"product_id": "6Server-optional-6.3.EUS:kernel-debuginfo-common-s390x-0:2.6.32-279.31.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-279.31.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-279.31.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)",
"product_id": "6Server-optional-6.3.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-279.31.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-279.31.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-279.31.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)",
"product_id": "6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-279.31.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-279.31.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)",
"product_id": "6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-279.31.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-279.31.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)",
"product_id": "6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-279.31.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-279.31.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)",
"product_id": "6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-279.31.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-279.31.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)",
"product_id": "6Server-optional-6.3.EUS:kernel-doc-0:2.6.32-279.31.1.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-279.31.1.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-279.31.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)",
"product_id": "6Server-optional-6.3.EUS:kernel-firmware-0:2.6.32-279.31.1.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-279.31.1.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-279.31.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)",
"product_id": "6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-279.31.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-279.31.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)",
"product_id": "6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-279.31.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-279.31.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)",
"product_id": "6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-279.31.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-279.31.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)",
"product_id": "6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-279.31.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-279.31.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)",
"product_id": "6Server-optional-6.3.EUS:kernel-kdump-0:2.6.32-279.31.1.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-279.31.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-279.31.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)",
"product_id": "6Server-optional-6.3.EUS:kernel-kdump-debuginfo-0:2.6.32-279.31.1.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-279.31.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)",
"product_id": "6Server-optional-6.3.EUS:kernel-kdump-devel-0:2.6.32-279.31.1.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-279.31.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-279.31.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)",
"product_id": "6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.i686"
},
"product_reference": "perf-0:2.6.32-279.31.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-279.31.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)",
"product_id": "6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-279.31.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-279.31.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)",
"product_id": "6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.s390x"
},
"product_reference": "perf-0:2.6.32-279.31.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-279.31.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)",
"product_id": "6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-279.31.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-279.31.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)",
"product_id": "6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)",
"product_id": "6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-279.31.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)",
"product_id": "6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)",
"product_id": "6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-279.31.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)",
"product_id": "6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-279.31.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-279.31.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)",
"product_id": "6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-279.31.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-279.31.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)",
"product_id": "6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-279.31.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-279.31.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)",
"product_id": "6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-279.31.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-279.31.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)",
"product_id": "6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)",
"product_id": "6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-279.31.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)",
"product_id": "6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)",
"product_id": "6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.3.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Paolo Bonzini"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2012-4542",
"discovery_date": "2012-10-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "875360"
}
],
"notes": [
{
"category": "description",
"text": "block/scsi_ioctl.c in the Linux kernel through 3.8 does not properly consider the SCSI device class during authorization of SCSI commands, which allows local users to bypass intended access restrictions via an SG_IO ioctl call that leverages overlapping opcodes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: block: default SCSI command filter does not accomodate commands overlap across device classes",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 7. Due to the lack of upstream patches and the Moderate impact, we are not planning to address this issue in Red Hat Enterprise Linux 7.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.src",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-bootwrapper-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debuginfo-common-i686-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debuginfo-common-s390x-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-doc-0:2.6.32-279.31.1.el6.noarch",
"6Server-6.3.EUS:kernel-firmware-0:2.6.32-279.31.1.el6.noarch",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-kdump-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-kdump-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-kdump-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.src",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-bootwrapper-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-i686-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-s390x-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-doc-0:2.6.32-279.31.1.el6.noarch",
"6Server-optional-6.3.EUS:kernel-firmware-0:2.6.32-279.31.1.el6.noarch",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-kdump-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-kdump-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-kdump-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-4542"
},
{
"category": "external",
"summary": "RHBZ#875360",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=875360"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-4542",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4542"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-4542",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-4542"
}
],
"release_date": "2013-01-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-06-11T17:31:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.src",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-bootwrapper-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debuginfo-common-i686-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debuginfo-common-s390x-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-doc-0:2.6.32-279.31.1.el6.noarch",
"6Server-6.3.EUS:kernel-firmware-0:2.6.32-279.31.1.el6.noarch",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-kdump-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-kdump-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-kdump-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.src",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-bootwrapper-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-i686-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-s390x-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-doc-0:2.6.32-279.31.1.el6.noarch",
"6Server-optional-6.3.EUS:kernel-firmware-0:2.6.32-279.31.1.el6.noarch",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-kdump-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-kdump-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-kdump-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2013:0928"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "ADJACENT_NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.9,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:A/AC:M/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.src",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-bootwrapper-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debuginfo-common-i686-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debuginfo-common-s390x-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-doc-0:2.6.32-279.31.1.el6.noarch",
"6Server-6.3.EUS:kernel-firmware-0:2.6.32-279.31.1.el6.noarch",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-kdump-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-kdump-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-kdump-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.src",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-bootwrapper-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-i686-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-s390x-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-doc-0:2.6.32-279.31.1.el6.noarch",
"6Server-optional-6.3.EUS:kernel-firmware-0:2.6.32-279.31.1.el6.noarch",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-kdump-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-kdump-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-kdump-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: block: default SCSI command filter does not accomodate commands overlap across device classes"
},
{
"cve": "CVE-2013-0311",
"discovery_date": "2013-02-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "912905"
}
],
"notes": [
{
"category": "description",
"text": "The translate_desc function in drivers/vhost/vhost.c in the Linux kernel before 3.7 does not properly handle cross-region descriptors, which allows guest OS users to obtain host OS privileges by leveraging KVM guest OS privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: vhost: fix length for cross region descriptor",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did affect the version of Linux kernel as shipped with Red Hat Enterprise Linux 6.\n\nThis issue did not affect the version of Linux kernel as shipped with Red Hat Enterprise Linux 5 and Red Hat Enterprise MRG 2.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.src",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-bootwrapper-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debuginfo-common-i686-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debuginfo-common-s390x-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-doc-0:2.6.32-279.31.1.el6.noarch",
"6Server-6.3.EUS:kernel-firmware-0:2.6.32-279.31.1.el6.noarch",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-kdump-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-kdump-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-kdump-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.src",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-bootwrapper-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-i686-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-s390x-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-doc-0:2.6.32-279.31.1.el6.noarch",
"6Server-optional-6.3.EUS:kernel-firmware-0:2.6.32-279.31.1.el6.noarch",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-kdump-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-kdump-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-kdump-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0311"
},
{
"category": "external",
"summary": "RHBZ#912905",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=912905"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0311",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0311"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0311",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0311"
}
],
"release_date": "2013-02-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-06-11T17:31:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.src",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-bootwrapper-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debuginfo-common-i686-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debuginfo-common-s390x-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-doc-0:2.6.32-279.31.1.el6.noarch",
"6Server-6.3.EUS:kernel-firmware-0:2.6.32-279.31.1.el6.noarch",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-kdump-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-kdump-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-kdump-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.src",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-bootwrapper-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-i686-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-s390x-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-doc-0:2.6.32-279.31.1.el6.noarch",
"6Server-optional-6.3.EUS:kernel-firmware-0:2.6.32-279.31.1.el6.noarch",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-kdump-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-kdump-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-kdump-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2013:0928"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "ADJACENT_NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.5,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:A/AC:H/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
"products": [
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.src",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-bootwrapper-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debuginfo-common-i686-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debuginfo-common-s390x-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-doc-0:2.6.32-279.31.1.el6.noarch",
"6Server-6.3.EUS:kernel-firmware-0:2.6.32-279.31.1.el6.noarch",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-kdump-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-kdump-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-kdump-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.src",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-bootwrapper-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-i686-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-s390x-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-doc-0:2.6.32-279.31.1.el6.noarch",
"6Server-optional-6.3.EUS:kernel-firmware-0:2.6.32-279.31.1.el6.noarch",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-kdump-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-kdump-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-kdump-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: vhost: fix length for cross region descriptor"
},
{
"cve": "CVE-2013-1767",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2013-02-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "915592"
}
],
"notes": [
{
"category": "description",
"text": "Use-after-free vulnerability in the shmem_remount_fs function in mm/shmem.c in the Linux kernel before 3.7.10 allows local users to gain privileges or cause a denial of service (system crash) by remounting a tmpfs filesystem without specifying a required mpol (aka mempolicy) mount option.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tmpfs: fix use-after-free of mempolicy object",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect the versions of the kernel package as shipped with Red Hat Enterprise Linux 5.\n\nThis issue affects the version of Linux kernel as shipped with Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG 2.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.src",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-bootwrapper-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debuginfo-common-i686-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debuginfo-common-s390x-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-doc-0:2.6.32-279.31.1.el6.noarch",
"6Server-6.3.EUS:kernel-firmware-0:2.6.32-279.31.1.el6.noarch",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-kdump-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-kdump-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-kdump-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.src",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-bootwrapper-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-i686-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-s390x-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-doc-0:2.6.32-279.31.1.el6.noarch",
"6Server-optional-6.3.EUS:kernel-firmware-0:2.6.32-279.31.1.el6.noarch",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-kdump-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-kdump-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-kdump-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1767"
},
{
"category": "external",
"summary": "RHBZ#915592",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=915592"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1767",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1767"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1767",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1767"
}
],
"release_date": "2013-02-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-06-11T17:31:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.src",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-bootwrapper-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debuginfo-common-i686-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debuginfo-common-s390x-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-doc-0:2.6.32-279.31.1.el6.noarch",
"6Server-6.3.EUS:kernel-firmware-0:2.6.32-279.31.1.el6.noarch",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-kdump-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-kdump-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-kdump-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.src",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-bootwrapper-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-i686-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-s390x-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-doc-0:2.6.32-279.31.1.el6.noarch",
"6Server-optional-6.3.EUS:kernel-firmware-0:2.6.32-279.31.1.el6.noarch",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-kdump-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-kdump-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-kdump-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2013:0928"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
"products": [
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.src",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-bootwrapper-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debuginfo-common-i686-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debuginfo-common-s390x-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-doc-0:2.6.32-279.31.1.el6.noarch",
"6Server-6.3.EUS:kernel-firmware-0:2.6.32-279.31.1.el6.noarch",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-kdump-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-kdump-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-kdump-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.src",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-bootwrapper-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-i686-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-s390x-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-doc-0:2.6.32-279.31.1.el6.noarch",
"6Server-optional-6.3.EUS:kernel-firmware-0:2.6.32-279.31.1.el6.noarch",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-kdump-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-kdump-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-kdump-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Kernel: tmpfs: fix use-after-free of mempolicy object"
},
{
"cve": "CVE-2013-1773",
"discovery_date": "2013-02-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "916115"
}
],
"notes": [
{
"category": "description",
"text": "Buffer overflow in the VFAT filesystem implementation in the Linux kernel before 3.3 allows local users to gain privileges or cause a denial of service (system crash) via a VFAT write operation on a filesystem with the utf8 mount option, which is not properly handled during UTF-8 to UTF-16 conversion.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: VFAT slab-based buffer overflow",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect the version of Linux kernel as shipped with Red Hat Enterprise Linux 5.\n\nThis issue did affect the version of Linux kernel as shipped with Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG 2.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.src",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-bootwrapper-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debuginfo-common-i686-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debuginfo-common-s390x-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-doc-0:2.6.32-279.31.1.el6.noarch",
"6Server-6.3.EUS:kernel-firmware-0:2.6.32-279.31.1.el6.noarch",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-kdump-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-kdump-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-kdump-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.src",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-bootwrapper-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-i686-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-s390x-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-doc-0:2.6.32-279.31.1.el6.noarch",
"6Server-optional-6.3.EUS:kernel-firmware-0:2.6.32-279.31.1.el6.noarch",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-kdump-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-kdump-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-kdump-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1773"
},
{
"category": "external",
"summary": "RHBZ#916115",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=916115"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1773",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1773"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1773",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1773"
}
],
"release_date": "2012-12-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-06-11T17:31:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.src",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-bootwrapper-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debuginfo-common-i686-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debuginfo-common-s390x-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-doc-0:2.6.32-279.31.1.el6.noarch",
"6Server-6.3.EUS:kernel-firmware-0:2.6.32-279.31.1.el6.noarch",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-kdump-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-kdump-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-kdump-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.src",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-bootwrapper-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-i686-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-s390x-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-doc-0:2.6.32-279.31.1.el6.noarch",
"6Server-optional-6.3.EUS:kernel-firmware-0:2.6.32-279.31.1.el6.noarch",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-kdump-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-kdump-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-kdump-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2013:0928"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"products": [
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.src",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-bootwrapper-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debuginfo-common-i686-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debuginfo-common-s390x-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-doc-0:2.6.32-279.31.1.el6.noarch",
"6Server-6.3.EUS:kernel-firmware-0:2.6.32-279.31.1.el6.noarch",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-kdump-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-kdump-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-kdump-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.src",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-bootwrapper-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-i686-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-s390x-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-doc-0:2.6.32-279.31.1.el6.noarch",
"6Server-optional-6.3.EUS:kernel-firmware-0:2.6.32-279.31.1.el6.noarch",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-kdump-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-kdump-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-kdump-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: VFAT slab-based buffer overflow"
},
{
"acknowledgments": [
{
"names": [
"Andrew Honig"
],
"organization": "Google"
}
],
"cve": "CVE-2013-1796",
"discovery_date": "2013-02-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "917012"
}
],
"notes": [
{
"category": "description",
"text": "The kvm_set_msr_common function in arch/x86/kvm/x86.c in the Linux kernel through 3.8.4 does not ensure a required time_page alignment during an MSR_KVM_SYSTEM_TIME operation, which allows guest OS users to cause a denial of service (buffer overflow and host OS memory corruption) or possibly have unspecified other impact via a crafted application.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: kvm: buffer overflow in handling of MSR_KVM_SYSTEM_TIME",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat\nEnterprise Linux 5 and Red Hat Enterprise MRG as they did not provide support\nfor the KVM subsystem.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.src",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-bootwrapper-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debuginfo-common-i686-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debuginfo-common-s390x-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-doc-0:2.6.32-279.31.1.el6.noarch",
"6Server-6.3.EUS:kernel-firmware-0:2.6.32-279.31.1.el6.noarch",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-kdump-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-kdump-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-kdump-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.src",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-bootwrapper-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-i686-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-s390x-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-doc-0:2.6.32-279.31.1.el6.noarch",
"6Server-optional-6.3.EUS:kernel-firmware-0:2.6.32-279.31.1.el6.noarch",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-kdump-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-kdump-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-kdump-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1796"
},
{
"category": "external",
"summary": "RHBZ#917012",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=917012"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1796",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1796"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1796",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1796"
}
],
"release_date": "2013-03-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-06-11T17:31:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.src",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-bootwrapper-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debuginfo-common-i686-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debuginfo-common-s390x-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-doc-0:2.6.32-279.31.1.el6.noarch",
"6Server-6.3.EUS:kernel-firmware-0:2.6.32-279.31.1.el6.noarch",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-kdump-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-kdump-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-kdump-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.src",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-bootwrapper-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-i686-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-s390x-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-doc-0:2.6.32-279.31.1.el6.noarch",
"6Server-optional-6.3.EUS:kernel-firmware-0:2.6.32-279.31.1.el6.noarch",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-kdump-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-kdump-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-kdump-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2013:0928"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "ADJACENT_NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.5,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:A/AC:H/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
"products": [
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.src",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-bootwrapper-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debuginfo-common-i686-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debuginfo-common-s390x-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-doc-0:2.6.32-279.31.1.el6.noarch",
"6Server-6.3.EUS:kernel-firmware-0:2.6.32-279.31.1.el6.noarch",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-kdump-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-kdump-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-kdump-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.src",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-bootwrapper-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-i686-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-s390x-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-doc-0:2.6.32-279.31.1.el6.noarch",
"6Server-optional-6.3.EUS:kernel-firmware-0:2.6.32-279.31.1.el6.noarch",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-kdump-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-kdump-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-kdump-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: kvm: buffer overflow in handling of MSR_KVM_SYSTEM_TIME"
},
{
"acknowledgments": [
{
"names": [
"Andrew Honig"
],
"organization": "Google"
}
],
"cve": "CVE-2013-1797",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2013-02-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "917013"
}
],
"notes": [
{
"category": "description",
"text": "Use-after-free vulnerability in arch/x86/kvm/x86.c in the Linux kernel through 3.8.4 allows guest OS users to cause a denial of service (host OS memory corruption) or possibly have unspecified other impact via a crafted application that triggers use of a guest physical address (GPA) in (1) movable or (2) removable memory during an MSR_KVM_SYSTEM_TIME kvm_set_msr_common operation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: kvm: after free issue with the handling of MSR_KVM_SYSTEM_TIME",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat\nEnterprise Linux 5 and Red Hat Enterprise MRG as they did not provide support\nfor the KVM subsystem.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.src",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-bootwrapper-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debuginfo-common-i686-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debuginfo-common-s390x-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-doc-0:2.6.32-279.31.1.el6.noarch",
"6Server-6.3.EUS:kernel-firmware-0:2.6.32-279.31.1.el6.noarch",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-kdump-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-kdump-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-kdump-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.src",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-bootwrapper-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-i686-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-s390x-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-doc-0:2.6.32-279.31.1.el6.noarch",
"6Server-optional-6.3.EUS:kernel-firmware-0:2.6.32-279.31.1.el6.noarch",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-kdump-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-kdump-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-kdump-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1797"
},
{
"category": "external",
"summary": "RHBZ#917013",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=917013"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1797",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1797"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1797",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1797"
}
],
"release_date": "2013-03-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-06-11T17:31:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.src",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-bootwrapper-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debuginfo-common-i686-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debuginfo-common-s390x-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-doc-0:2.6.32-279.31.1.el6.noarch",
"6Server-6.3.EUS:kernel-firmware-0:2.6.32-279.31.1.el6.noarch",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-kdump-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-kdump-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-kdump-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.src",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-bootwrapper-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-i686-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-s390x-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-doc-0:2.6.32-279.31.1.el6.noarch",
"6Server-optional-6.3.EUS:kernel-firmware-0:2.6.32-279.31.1.el6.noarch",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-kdump-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-kdump-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-kdump-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2013:0928"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "ADJACENT_NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.5,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:A/AC:H/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
"products": [
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.src",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-bootwrapper-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debuginfo-common-i686-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debuginfo-common-s390x-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-doc-0:2.6.32-279.31.1.el6.noarch",
"6Server-6.3.EUS:kernel-firmware-0:2.6.32-279.31.1.el6.noarch",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-kdump-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-kdump-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-kdump-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.src",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-bootwrapper-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-i686-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-s390x-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-doc-0:2.6.32-279.31.1.el6.noarch",
"6Server-optional-6.3.EUS:kernel-firmware-0:2.6.32-279.31.1.el6.noarch",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-kdump-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-kdump-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-kdump-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: kvm: after free issue with the handling of MSR_KVM_SYSTEM_TIME"
},
{
"acknowledgments": [
{
"names": [
"Andrew Honig"
],
"organization": "Google"
}
],
"cve": "CVE-2013-1798",
"discovery_date": "2013-02-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "917017"
}
],
"notes": [
{
"category": "description",
"text": "The ioapic_read_indirect function in virt/kvm/ioapic.c in the Linux kernel through 3.8.4 does not properly handle a certain combination of invalid IOAPIC_REG_SELECT and IOAPIC_REG_WINDOW operations, which allows guest OS users to obtain sensitive information from host OS memory or cause a denial of service (host OS OOPS) via a crafted application.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: kvm: out-of-bounds access in ioapic indirect register reads",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat\nEnterprise Linux 5 and Red Hat Enterprise MRG as they did not provide support\nfor the KVM subsystem.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.src",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-bootwrapper-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debuginfo-common-i686-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debuginfo-common-s390x-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-doc-0:2.6.32-279.31.1.el6.noarch",
"6Server-6.3.EUS:kernel-firmware-0:2.6.32-279.31.1.el6.noarch",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-kdump-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-kdump-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-kdump-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.src",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-bootwrapper-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-i686-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-s390x-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-doc-0:2.6.32-279.31.1.el6.noarch",
"6Server-optional-6.3.EUS:kernel-firmware-0:2.6.32-279.31.1.el6.noarch",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-kdump-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-kdump-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-kdump-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1798"
},
{
"category": "external",
"summary": "RHBZ#917017",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=917017"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1798",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1798"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1798",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1798"
}
],
"release_date": "2013-03-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-06-11T17:31:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.src",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-bootwrapper-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debuginfo-common-i686-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debuginfo-common-s390x-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-doc-0:2.6.32-279.31.1.el6.noarch",
"6Server-6.3.EUS:kernel-firmware-0:2.6.32-279.31.1.el6.noarch",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-kdump-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-kdump-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-kdump-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.src",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-bootwrapper-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-i686-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-s390x-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-doc-0:2.6.32-279.31.1.el6.noarch",
"6Server-optional-6.3.EUS:kernel-firmware-0:2.6.32-279.31.1.el6.noarch",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-kdump-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-kdump-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-kdump-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2013:0928"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "ADJACENT_NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 5.9,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:H/Au:S/C:C/I:N/A:C",
"version": "2.0"
},
"products": [
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.src",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-bootwrapper-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debuginfo-common-i686-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debuginfo-common-s390x-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-doc-0:2.6.32-279.31.1.el6.noarch",
"6Server-6.3.EUS:kernel-firmware-0:2.6.32-279.31.1.el6.noarch",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-kdump-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-kdump-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-kdump-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.src",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-bootwrapper-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-i686-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-s390x-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-doc-0:2.6.32-279.31.1.el6.noarch",
"6Server-optional-6.3.EUS:kernel-firmware-0:2.6.32-279.31.1.el6.noarch",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-kdump-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-kdump-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-kdump-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: kvm: out-of-bounds access in ioapic indirect register reads"
},
{
"cve": "CVE-2013-1848",
"discovery_date": "2013-03-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "920783"
}
],
"notes": [
{
"category": "description",
"text": "fs/ext3/super.c in the Linux kernel before 3.8.4 uses incorrect arguments to functions in certain circumstances related to printk input, which allows local users to conduct format-string attacks and possibly gain privileges via a crafted application.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ext3: format string issues",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of the kernel package as shipped with Red Hat Enterprise Linux 5 because it did not backport the commit 4cf46b67eb that introduced this issue.\n\nThis issue affects the version of Linux kernel as shipped with Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG 2 may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.src",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-bootwrapper-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debuginfo-common-i686-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debuginfo-common-s390x-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-doc-0:2.6.32-279.31.1.el6.noarch",
"6Server-6.3.EUS:kernel-firmware-0:2.6.32-279.31.1.el6.noarch",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-kdump-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-kdump-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-kdump-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.src",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-bootwrapper-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-i686-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-s390x-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-doc-0:2.6.32-279.31.1.el6.noarch",
"6Server-optional-6.3.EUS:kernel-firmware-0:2.6.32-279.31.1.el6.noarch",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-kdump-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-kdump-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-kdump-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1848"
},
{
"category": "external",
"summary": "RHBZ#920783",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=920783"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1848",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1848"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1848",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1848"
}
],
"release_date": "2013-03-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-06-11T17:31:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.src",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-bootwrapper-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debuginfo-common-i686-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debuginfo-common-s390x-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-doc-0:2.6.32-279.31.1.el6.noarch",
"6Server-6.3.EUS:kernel-firmware-0:2.6.32-279.31.1.el6.noarch",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-kdump-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-kdump-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-kdump-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.src",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-bootwrapper-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-i686-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-s390x-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-doc-0:2.6.32-279.31.1.el6.noarch",
"6Server-optional-6.3.EUS:kernel-firmware-0:2.6.32-279.31.1.el6.noarch",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-kdump-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-kdump-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-kdump-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2013:0928"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
"products": [
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.src",
"6Server-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-bootwrapper-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-debuginfo-common-i686-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-debuginfo-common-s390x-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-doc-0:2.6.32-279.31.1.el6.noarch",
"6Server-6.3.EUS:kernel-firmware-0:2.6.32-279.31.1.el6.noarch",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:kernel-kdump-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-kdump-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:kernel-kdump-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.src",
"6Server-optional-6.3.EUS:kernel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-bootwrapper-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debug-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debug-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debug-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-i686-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-s390x-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-devel-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-doc-0:2.6.32-279.31.1.el6.noarch",
"6Server-optional-6.3.EUS:kernel-firmware-0:2.6.32-279.31.1.el6.noarch",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-headers-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:kernel-kdump-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-kdump-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:kernel-kdump-devel-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:python-perf-0:2.6.32-279.31.1.el6.x86_64",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.i686",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.ppc64",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.s390x",
"6Server-optional-6.3.EUS:python-perf-debuginfo-0:2.6.32-279.31.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: ext3: format string issues"
}
]
}
RHSA-2013:0579
Vulnerability from csaf_redhat - Published: 2013-02-28 18:40 - Updated: 2025-11-21 17:42Dnsmasq before 2.63test1, when used with certain libvirt configurations, replies to requests from prohibited interfaces, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed DNS query.
block/scsi_ioctl.c in the Linux kernel through 3.8 does not properly consider the SCSI device class during authorization of SCSI commands, which allows local users to bypass intended access restrictions via an SG_IO ioctl call that leverages overlapping opcodes.
The translate_desc function in drivers/vhost/vhost.c in the Linux kernel before 3.7 does not properly handle cross-region descriptors, which allows guest OS users to obtain host OS privileges by leveraging KVM guest OS privileges.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An updated rhev-hypervisor6 package that fixes three security issues,\nvarious bugs, and adds an enhancement is now available.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The rhev-hypervisor6 package provides a Red Hat Enterprise Virtualization\nHypervisor ISO disk image. The Red Hat Enterprise Virtualization Hypervisor\nis a dedicated Kernel-based Virtual Machine (KVM) hypervisor. It includes\neverything necessary to run and manage virtual machines: A subset of the\nRed Hat Enterprise Linux operating environment and the Red Hat Enterprise\nVirtualization Agent.\n\nNote: Red Hat Enterprise Virtualization Hypervisor is only available for\nthe Intel 64 and AMD64 architectures with virtualization extensions.\n\nA flaw was found in the way the vhost kernel module handled descriptors\nthat spanned multiple regions. A privileged guest user could use this flaw\nto crash the host or, potentially, escalate their privileges on the host.\n(CVE-2013-0311)\n\nIt was found that the default SCSI command filter does not accommodate\ncommands that overlap across device classes. A privileged guest user could\npotentially use this flaw to write arbitrary data to a LUN that is\npassed-through as read-only. (CVE-2012-4542)\n\nIt was discovered that dnsmasq, when used in combination with certain\nlibvirtd configurations, could incorrectly process network packets from\nnetwork interfaces that were intended to be prohibited. A remote,\nunauthenticated attacker could exploit this flaw to cause a denial of\nservice via DNS amplification attacks. (CVE-2012-3411)\n\nThe CVE-2012-4542 issue was discovered by Paolo Bonzini of Red Hat.\n\nThis updated package provides updated components that include fixes for\nseveral security issues. These issues had no security impact on Red Hat\nEnterprise Virtualization Hypervisor itself, however. The security fixes\nincluded in this update address the following CVE numbers:\n\nCVE-2012-3955 (dhcp issue)\n\nCVE-2011-4355 (gdb issue)\n\nCVE-2012-4508, CVE-2013-0190, CVE-2013-0309, and CVE-2013-0310 (kernel\nissues)\n\nCVE-2012-5536 (openssh issue)\n\nCVE-2011-3148 and CVE-2011-3149 (pam issues)\n\nCVE-2013-0157 (util-linux-ng issue)\n\nThis updated Red Hat Enterprise Virtualization Hypervisor package also\nfixes the following bugs:\n\n* Previously, the Administration Portal would always display the option to\nupgrade the Red Hat Enterprise Virtualization Hypervisor ISO regardless of\nwhether or not the selected host was up-to-date. Now, the VDSM version\ncompatibility is considered and the upgrade message only displays if there\nis an upgrade relevant to the host available. (BZ#853092)\n\n* An out of date version of libvirt was included in the Red Hat Enterprise\nVirtualization Hypervisor 6.4 package. As a result, virtual machines with\nsupported CPU models were not being properly parsed by libvirt and failed\nto start. A more recent version of libvirt has been included in this\nupdated hypervisor package. Virtual machines now start normally.\n(BZ#895078)\n\nAs well, this update adds the following enhancement:\n\n* Hypervisor packages now take advantage of the installonlypkg function\nprovided by yum. This allows for multiple versions of the hypervisor\npackage to be installed on a system concurrently without making changes to\nthe yum configuration as was previously required. (BZ#863579)\n\nThis update includes the ovirt-node build from RHBA-2013:0556:\n\n https://rhn.redhat.com/errata/RHBA-2013-0556.html\n\nUsers of the Red Hat Enterprise Virtualization Hypervisor are advised to\nupgrade to this updated package, which fixes these issues and adds this\nenhancement.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2013:0579",
"url": "https://access.redhat.com/errata/RHSA-2013:0579"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://rhn.redhat.com/errata/RHBA-2013-0556.html",
"url": "https://rhn.redhat.com/errata/RHBA-2013-0556.html"
},
{
"category": "external",
"summary": "https://access.redhat.com/knowledge/articles/11258",
"url": "https://access.redhat.com/knowledge/articles/11258"
},
{
"category": "external",
"summary": "https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html",
"url": "https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html"
},
{
"category": "external",
"summary": "833033",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=833033"
},
{
"category": "external",
"summary": "835162",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=835162"
},
{
"category": "external",
"summary": "853092",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=853092"
},
{
"category": "external",
"summary": "863579",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=863579"
},
{
"category": "external",
"summary": "875360",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=875360"
},
{
"category": "external",
"summary": "912905",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=912905"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_0579.json"
}
],
"title": "Red Hat Security Advisory: rhev-hypervisor6 security, bug fix, and enhancement update",
"tracking": {
"current_release_date": "2025-11-21T17:42:42+00:00",
"generator": {
"date": "2025-11-21T17:42:42+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2013:0579",
"initial_release_date": "2013-02-28T18:40:00+00:00",
"revision_history": [
{
"date": "2013-02-28T18:40:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2013-02-28T18:55:03+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:42:42+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHEV Hypervisor for RHEL-6",
"product": {
"name": "RHEV Hypervisor for RHEL-6",
"product_id": "6Server-RHEV-Hypervisor",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::hypervisor"
}
}
}
],
"category": "product_family",
"name": "Red Hat Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "rhev-hypervisor6-0:6.4-20130221.0.el6.noarch",
"product": {
"name": "rhev-hypervisor6-0:6.4-20130221.0.el6.noarch",
"product_id": "rhev-hypervisor6-0:6.4-20130221.0.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhev-hypervisor6@6.4-20130221.0.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rhev-hypervisor6-0:6.4-20130221.0.el6.noarch as a component of RHEV Hypervisor for RHEL-6",
"product_id": "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.4-20130221.0.el6.noarch"
},
"product_reference": "rhev-hypervisor6-0:6.4-20130221.0.el6.noarch",
"relates_to_product_reference": "6Server-RHEV-Hypervisor"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2012-3411",
"discovery_date": "2012-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "833033"
}
],
"notes": [
{
"category": "description",
"text": "Dnsmasq before 2.63test1, when used with certain libvirt configurations, replies to requests from prohibited interfaces, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed DNS query.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libvirt+dnsmasq: DNS configured to answer DNS queries from non-virtual networks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 5 is now in Production 3 Phase of the support and maintenance life cycle. This has been rated as having Low security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.4-20130221.0.el6.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-3411"
},
{
"category": "external",
"summary": "RHBZ#833033",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=833033"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-3411",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3411"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3411",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3411"
}
],
"release_date": "2012-07-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-02-28T18:40:00+00:00",
"details": "This update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization\nenvironments using the disk image provided by this package, refer to:\n\nhttps://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html",
"product_ids": [
"6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.4-20130221.0.el6.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:0579"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.4-20130221.0.el6.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libvirt+dnsmasq: DNS configured to answer DNS queries from non-virtual networks"
},
{
"acknowledgments": [
{
"names": [
"Paolo Bonzini"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2012-4542",
"discovery_date": "2012-10-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "875360"
}
],
"notes": [
{
"category": "description",
"text": "block/scsi_ioctl.c in the Linux kernel through 3.8 does not properly consider the SCSI device class during authorization of SCSI commands, which allows local users to bypass intended access restrictions via an SG_IO ioctl call that leverages overlapping opcodes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: block: default SCSI command filter does not accomodate commands overlap across device classes",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 7. Due to the lack of upstream patches and the Moderate impact, we are not planning to address this issue in Red Hat Enterprise Linux 7.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.4-20130221.0.el6.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-4542"
},
{
"category": "external",
"summary": "RHBZ#875360",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=875360"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-4542",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4542"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-4542",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-4542"
}
],
"release_date": "2013-01-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-02-28T18:40:00+00:00",
"details": "This update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization\nenvironments using the disk image provided by this package, refer to:\n\nhttps://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html",
"product_ids": [
"6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.4-20130221.0.el6.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:0579"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "ADJACENT_NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.9,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:A/AC:M/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.4-20130221.0.el6.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: block: default SCSI command filter does not accomodate commands overlap across device classes"
},
{
"cve": "CVE-2013-0311",
"discovery_date": "2013-02-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "912905"
}
],
"notes": [
{
"category": "description",
"text": "The translate_desc function in drivers/vhost/vhost.c in the Linux kernel before 3.7 does not properly handle cross-region descriptors, which allows guest OS users to obtain host OS privileges by leveraging KVM guest OS privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: vhost: fix length for cross region descriptor",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did affect the version of Linux kernel as shipped with Red Hat Enterprise Linux 6.\n\nThis issue did not affect the version of Linux kernel as shipped with Red Hat Enterprise Linux 5 and Red Hat Enterprise MRG 2.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.4-20130221.0.el6.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0311"
},
{
"category": "external",
"summary": "RHBZ#912905",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=912905"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0311",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0311"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0311",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0311"
}
],
"release_date": "2013-02-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-02-28T18:40:00+00:00",
"details": "This update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization\nenvironments using the disk image provided by this package, refer to:\n\nhttps://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html",
"product_ids": [
"6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.4-20130221.0.el6.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:0579"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "ADJACENT_NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.5,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:A/AC:H/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
"products": [
"6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.4-20130221.0.el6.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: vhost: fix length for cross region descriptor"
}
]
}
RHSA-2013:0496
Vulnerability from csaf_redhat - Published: 2013-02-20 16:32 - Updated: 2025-11-21 17:42Race condition in fs/ext4/extents.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from a deleted file by reading an extent that was not properly marked as uninitialized.
block/scsi_ioctl.c in the Linux kernel through 3.8 does not properly consider the SCSI device class during authorization of SCSI commands, which allows local users to bypass intended access restrictions via an SG_IO ioctl call that leverages overlapping opcodes.
The xen_failsafe_callback function in Xen for the Linux kernel 2.6.23 and other versions, when running a 32-bit PVOPS guest, allows local users to cause a denial of service (guest crash) by triggering an iret fault, leading to use of an incorrect stack pointer and stack corruption.
arch/x86/include/asm/pgtable.h in the Linux kernel before 3.6.2, when transparent huge pages are used, does not properly support PROT_NONE memory regions, which allows local users to cause a denial of service (system crash) via a crafted application.
The cipso_v4_validate function in net/ipv4/cipso_ipv4.c in the Linux kernel before 3.4.8 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via an IPOPT_CIPSO IP_OPTIONS setsockopt system call.
The translate_desc function in drivers/vhost/vhost.c in the Linux kernel before 3.7 does not properly handle cross-region descriptors, which allows guest OS users to obtain host OS privileges by leveraging KVM guest OS privileges.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated kernel packages that fix multiple security issues, address several\nhundred bugs, and add numerous enhancements are now available as part of\nthe ongoing support and maintenance of Red Hat Enterprise Linux version 6.\nThis is the fourth regular update.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues:\n\n* A race condition was found in the way asynchronous I/O and fallocate()\ninteracted when using the ext4 file system. A local, unprivileged user\ncould use this flaw to expose random data from an extent whose data blocks\nhave not yet been written, and thus contain data from a deleted file.\n(CVE-2012-4508, Important)\n\n* A flaw was found in the way the vhost kernel module handled descriptors\nthat spanned multiple regions. A privileged guest user in a KVM guest could\nuse this flaw to crash the host or, potentially, escalate their privileges\non the host. (CVE-2013-0311, Important)\n\n* It was found that the default SCSI command filter does not accommodate\ncommands that overlap across device classes. A privileged guest user could\npotentially use this flaw to write arbitrary data to a LUN that is\npassed-through as read-only. (CVE-2012-4542, Moderate)\n\n* A flaw was found in the way the xen_failsafe_callback() function in the\nLinux kernel handled the failed iret (interrupt return) instruction\nnotification from the Xen hypervisor. An unprivileged user in a 32-bit\npara-virtualized guest could use this flaw to crash the guest.\n(CVE-2013-0190, Moderate)\n\n* A flaw was found in the way pmd_present() interacted with PROT_NONE\nmemory ranges when transparent hugepages were in use. A local, unprivileged\nuser could use this flaw to crash the system. (CVE-2013-0309, Moderate)\n\n* A flaw was found in the way CIPSO (Common IP Security Option) IP options\nwere validated when set from user mode. A local user able to set CIPSO IP\noptions on the socket could use this flaw to crash the system.\n(CVE-2013-0310, Moderate)\n\nRed Hat would like to thank Theodore Ts\u0027o for reporting CVE-2012-4508, and\nAndrew Cooper of Citrix for reporting CVE-2013-0190. Upstream acknowledges\nDmitry Monakhov as the original reporter of CVE-2012-4508. The\nCVE-2012-4542 issue was discovered by Paolo Bonzini of Red Hat.\n\nThis update also fixes several hundred bugs and adds enhancements. Refer to\nthe Red Hat Enterprise Linux 6.4 Release Notes for information on the most\nsignificant of these changes, and the Technical Notes for further\ninformation, both linked to in the References.\n\nAll Red Hat Enterprise Linux 6 users are advised to install these updated\npackages, which correct these issues, and fix the bugs and add the\nenhancements noted in the Red Hat Enterprise Linux 6.4 Release Notes and\nTechnical Notes. The system must be rebooted for this update to take\neffect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2013:0496",
"url": "https://access.redhat.com/errata/RHSA-2013:0496"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/6/html-single/6.4_Release_Notes/index.html",
"url": "https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/6/html-single/6.4_Release_Notes/index.html"
},
{
"category": "external",
"summary": "https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/6/html/6.4_Technical_Notes/kernel.html",
"url": "https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/6/html/6.4_Technical_Notes/kernel.html"
},
{
"category": "external",
"summary": "664586",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=664586"
},
{
"category": "external",
"summary": "700324",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=700324"
},
{
"category": "external",
"summary": "734051",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=734051"
},
{
"category": "external",
"summary": "735768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=735768"
},
{
"category": "external",
"summary": "749273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=749273"
},
{
"category": "external",
"summary": "758202",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=758202"
},
{
"category": "external",
"summary": "767886",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=767886"
},
{
"category": "external",
"summary": "784174",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=784174"
},
{
"category": "external",
"summary": "796352",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=796352"
},
{
"category": "external",
"summary": "796992",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=796992"
},
{
"category": "external",
"summary": "807503",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=807503"
},
{
"category": "external",
"summary": "808112",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=808112"
},
{
"category": "external",
"summary": "813137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=813137"
},
{
"category": "external",
"summary": "813227",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=813227"
},
{
"category": "external",
"summary": "816059",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=816059"
},
{
"category": "external",
"summary": "816308",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=816308"
},
{
"category": "external",
"summary": "816880",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=816880"
},
{
"category": "external",
"summary": "816888",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=816888"
},
{
"category": "external",
"summary": "817243",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=817243"
},
{
"category": "external",
"summary": "821060",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=821060"
},
{
"category": "external",
"summary": "821463",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=821463"
},
{
"category": "external",
"summary": "822075",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=822075"
},
{
"category": "external",
"summary": "823018",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=823018"
},
{
"category": "external",
"summary": "823625",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=823625"
},
{
"category": "external",
"summary": "823630",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=823630"
},
{
"category": "external",
"summary": "823842",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=823842"
},
{
"category": "external",
"summary": "823843",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=823843"
},
{
"category": "external",
"summary": "823878",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=823878"
},
{
"category": "external",
"summary": "823902",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=823902"
},
{
"category": "external",
"summary": "823934",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=823934"
},
{
"category": "external",
"summary": "824065",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=824065"
},
{
"category": "external",
"summary": "824964",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=824964"
},
{
"category": "external",
"summary": "825009",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=825009"
},
{
"category": "external",
"summary": "826067",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=826067"
},
{
"category": "external",
"summary": "826650",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=826650"
},
{
"category": "external",
"summary": "827474",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=827474"
},
{
"category": "external",
"summary": "829031",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=829031"
},
{
"category": "external",
"summary": "830977",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=830977"
},
{
"category": "external",
"summary": "832252",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=832252"
},
{
"category": "external",
"summary": "832301",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=832301"
},
{
"category": "external",
"summary": "832486",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=832486"
},
{
"category": "external",
"summary": "834097",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=834097"
},
{
"category": "external",
"summary": "836803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=836803"
},
{
"category": "external",
"summary": "837871",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=837871"
},
{
"category": "external",
"summary": "839266",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=839266"
},
{
"category": "external",
"summary": "839984",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=839984"
},
{
"category": "external",
"summary": "840458",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=840458"
},
{
"category": "external",
"summary": "841578",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=841578"
},
{
"category": "external",
"summary": "841604",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=841604"
},
{
"category": "external",
"summary": "841622",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=841622"
},
{
"category": "external",
"summary": "841983",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=841983"
},
{
"category": "external",
"summary": "842312",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=842312"
},
{
"category": "external",
"summary": "842435",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=842435"
},
{
"category": "external",
"summary": "844542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=844542"
},
{
"category": "external",
"summary": "844579",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=844579"
},
{
"category": "external",
"summary": "844582",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=844582"
},
{
"category": "external",
"summary": "844583",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=844583"
},
{
"category": "external",
"summary": "845233",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=845233"
},
{
"category": "external",
"summary": "846585",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=846585"
},
{
"category": "external",
"summary": "846702",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=846702"
},
{
"category": "external",
"summary": "847722",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=847722"
},
{
"category": "external",
"summary": "849223",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=849223"
},
{
"category": "external",
"summary": "850642",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=850642"
},
{
"category": "external",
"summary": "851312",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=851312"
},
{
"category": "external",
"summary": "854066",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=854066"
},
{
"category": "external",
"summary": "854584",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=854584"
},
{
"category": "external",
"summary": "855436",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=855436"
},
{
"category": "external",
"summary": "855448",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=855448"
},
{
"category": "external",
"summary": "857555",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=857555"
},
{
"category": "external",
"summary": "857792",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=857792"
},
{
"category": "external",
"summary": "857956",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=857956"
},
{
"category": "external",
"summary": "858292",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=858292"
},
{
"category": "external",
"summary": "858850",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=858850"
},
{
"category": "external",
"summary": "859242",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=859242"
},
{
"category": "external",
"summary": "859259",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=859259"
},
{
"category": "external",
"summary": "859355",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=859355"
},
{
"category": "external",
"summary": "860404",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=860404"
},
{
"category": "external",
"summary": "862025",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=862025"
},
{
"category": "external",
"summary": "863077",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=863077"
},
{
"category": "external",
"summary": "863212",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=863212"
},
{
"category": "external",
"summary": "865380",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=865380"
},
{
"category": "external",
"summary": "865666",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=865666"
},
{
"category": "external",
"summary": "865929",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=865929"
},
{
"category": "external",
"summary": "866271",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=866271"
},
{
"category": "external",
"summary": "866417",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=866417"
},
{
"category": "external",
"summary": "867169",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=867169"
},
{
"category": "external",
"summary": "867688",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=867688"
},
{
"category": "external",
"summary": "868233",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=868233"
},
{
"category": "external",
"summary": "869856",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=869856"
},
{
"category": "external",
"summary": "869904",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=869904"
},
{
"category": "external",
"summary": "870246",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=870246"
},
{
"category": "external",
"summary": "870297",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=870297"
},
{
"category": "external",
"summary": "871350",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=871350"
},
{
"category": "external",
"summary": "871630",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=871630"
},
{
"category": "external",
"summary": "871968",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=871968"
},
{
"category": "external",
"summary": "872229",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=872229"
},
{
"category": "external",
"summary": "872232",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=872232"
},
{
"category": "external",
"summary": "872799",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=872799"
},
{
"category": "external",
"summary": "873226",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=873226"
},
{
"category": "external",
"summary": "873462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=873462"
},
{
"category": "external",
"summary": "873816",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=873816"
},
{
"category": "external",
"summary": "874322",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=874322"
},
{
"category": "external",
"summary": "874539",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=874539"
},
{
"category": "external",
"summary": "875309",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=875309"
},
{
"category": "external",
"summary": "875360",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=875360"
},
{
"category": "external",
"summary": "896038",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=896038"
},
{
"category": "external",
"summary": "912898",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=912898"
},
{
"category": "external",
"summary": "912900",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=912900"
},
{
"category": "external",
"summary": "912905",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=912905"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_0496.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Enterprise Linux 6 kernel update",
"tracking": {
"current_release_date": "2025-11-21T17:42:18+00:00",
"generator": {
"date": "2025-11-21T17:42:18+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2013:0496",
"initial_release_date": "2013-02-20T16:32:00+00:00",
"revision_history": [
{
"date": "2013-02-20T16:32:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2013-02-20T16:40:54+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:42:18+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-358.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-358.el6.x86_64",
"product": {
"name": "python-perf-0:2.6.32-358.el6.x86_64",
"product_id": "python-perf-0:2.6.32-358.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-358.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-358.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"product_id": "python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-358.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"product_id": "kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-358.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-358.el6.x86_64",
"product": {
"name": "perf-debuginfo-0:2.6.32-358.el6.x86_64",
"product_id": "perf-debuginfo-0:2.6.32-358.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-358.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"product_id": "kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-358.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-358.el6.x86_64",
"product": {
"name": "perf-0:2.6.32-358.el6.x86_64",
"product_id": "perf-0:2.6.32-358.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-358.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-358.el6.x86_64",
"product": {
"name": "kernel-debug-0:2.6.32-358.el6.x86_64",
"product_id": "kernel-debug-0:2.6.32-358.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-358.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-358.el6.x86_64",
"product": {
"name": "kernel-0:2.6.32-358.el6.x86_64",
"product_id": "kernel-0:2.6.32-358.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-358.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-358.el6.x86_64",
"product": {
"name": "kernel-headers-0:2.6.32-358.el6.x86_64",
"product_id": "kernel-headers-0:2.6.32-358.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-358.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-358.el6.x86_64",
"product": {
"name": "kernel-devel-0:2.6.32-358.el6.x86_64",
"product_id": "kernel-devel-0:2.6.32-358.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-358.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "python-perf-0:2.6.32-358.el6.i686",
"product": {
"name": "python-perf-0:2.6.32-358.el6.i686",
"product_id": "python-perf-0:2.6.32-358.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-358.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"product_id": "kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-358.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-358.el6.i686",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-358.el6.i686",
"product_id": "python-perf-debuginfo-0:2.6.32-358.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-358.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-358.el6.i686",
"product": {
"name": "kernel-debuginfo-0:2.6.32-358.el6.i686",
"product_id": "kernel-debuginfo-0:2.6.32-358.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-358.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"product": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"product_id": "kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-i686@2.6.32-358.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-358.el6.i686",
"product": {
"name": "perf-debuginfo-0:2.6.32-358.el6.i686",
"product_id": "perf-debuginfo-0:2.6.32-358.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-358.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-358.el6.i686",
"product": {
"name": "kernel-debug-devel-0:2.6.32-358.el6.i686",
"product_id": "kernel-debug-devel-0:2.6.32-358.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-358.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-358.el6.i686",
"product": {
"name": "perf-0:2.6.32-358.el6.i686",
"product_id": "perf-0:2.6.32-358.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-358.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-358.el6.i686",
"product": {
"name": "kernel-debug-0:2.6.32-358.el6.i686",
"product_id": "kernel-debug-0:2.6.32-358.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-358.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-358.el6.i686",
"product": {
"name": "kernel-0:2.6.32-358.el6.i686",
"product_id": "kernel-0:2.6.32-358.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-358.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-358.el6.i686",
"product": {
"name": "kernel-headers-0:2.6.32-358.el6.i686",
"product_id": "kernel-headers-0:2.6.32-358.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-358.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-358.el6.i686",
"product": {
"name": "kernel-devel-0:2.6.32-358.el6.i686",
"product_id": "kernel-devel-0:2.6.32-358.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-358.el6?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-358.el6.src",
"product": {
"name": "kernel-0:2.6.32-358.el6.src",
"product_id": "kernel-0:2.6.32-358.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-358.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"product": {
"name": "kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"product_id": "kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.32-358.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-358.el6.s390x",
"product": {
"name": "kernel-debug-devel-0:2.6.32-358.el6.s390x",
"product_id": "kernel-debug-devel-0:2.6.32-358.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-358.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-358.el6.s390x",
"product": {
"name": "perf-0:2.6.32-358.el6.s390x",
"product_id": "perf-0:2.6.32-358.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-358.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@2.6.32-358.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"product_id": "kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-358.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"product_id": "python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-358.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-358.el6.s390x",
"product": {
"name": "kernel-debug-0:2.6.32-358.el6.s390x",
"product_id": "kernel-debug-0:2.6.32-358.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-358.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"product_id": "kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.32-358.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-358.el6.s390x",
"product": {
"name": "kernel-debuginfo-0:2.6.32-358.el6.s390x",
"product_id": "kernel-debuginfo-0:2.6.32-358.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-358.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-358.el6.s390x",
"product": {
"name": "kernel-0:2.6.32-358.el6.s390x",
"product_id": "kernel-0:2.6.32-358.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-358.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-358.el6.s390x",
"product": {
"name": "kernel-headers-0:2.6.32-358.el6.s390x",
"product_id": "kernel-headers-0:2.6.32-358.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-358.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-358.el6.s390x",
"product": {
"name": "perf-debuginfo-0:2.6.32-358.el6.s390x",
"product_id": "perf-debuginfo-0:2.6.32-358.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-358.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-358.el6.s390x",
"product": {
"name": "kernel-devel-0:2.6.32-358.el6.s390x",
"product_id": "kernel-devel-0:2.6.32-358.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-358.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:2.6.32-358.el6.s390x",
"product": {
"name": "kernel-kdump-0:2.6.32-358.el6.s390x",
"product_id": "kernel-kdump-0:2.6.32-358.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@2.6.32-358.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-358.el6.s390x",
"product": {
"name": "python-perf-0:2.6.32-358.el6.s390x",
"product_id": "python-perf-0:2.6.32-358.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-358.el6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"product_id": "kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-358.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-358.el6.ppc64",
"product": {
"name": "perf-0:2.6.32-358.el6.ppc64",
"product_id": "perf-0:2.6.32-358.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-358.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-358.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"product_id": "python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-358.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-358.el6.ppc64",
"product": {
"name": "kernel-debug-0:2.6.32-358.el6.ppc64",
"product_id": "kernel-debug-0:2.6.32-358.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-358.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"product": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"product_id": "kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@2.6.32-358.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"product_id": "kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-358.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-358.el6.ppc64",
"product": {
"name": "kernel-0:2.6.32-358.el6.ppc64",
"product_id": "kernel-0:2.6.32-358.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-358.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-358.el6.ppc64",
"product": {
"name": "kernel-headers-0:2.6.32-358.el6.ppc64",
"product_id": "kernel-headers-0:2.6.32-358.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-358.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-358.el6.ppc64",
"product": {
"name": "perf-debuginfo-0:2.6.32-358.el6.ppc64",
"product_id": "perf-debuginfo-0:2.6.32-358.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-358.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"product": {
"name": "kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"product_id": "kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@2.6.32-358.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-358.el6.ppc64",
"product": {
"name": "kernel-devel-0:2.6.32-358.el6.ppc64",
"product_id": "kernel-devel-0:2.6.32-358.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-358.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-358.el6.ppc64",
"product": {
"name": "python-perf-0:2.6.32-358.el6.ppc64",
"product_id": "python-perf-0:2.6.32-358.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-358.el6?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:2.6.32-358.el6.noarch",
"product": {
"name": "kernel-doc-0:2.6.32-358.el6.noarch",
"product_id": "kernel-doc-0:2.6.32-358.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.32-358.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-firmware-0:2.6.32-358.el6.noarch",
"product": {
"name": "kernel-firmware-0:2.6.32-358.el6.noarch",
"product_id": "kernel-firmware-0:2.6.32-358.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-358.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-0:2.6.32-358.el6.i686"
},
"product_reference": "kernel-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-0:2.6.32-358.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-358.el6.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-0:2.6.32-358.el6.src"
},
"product_reference": "kernel-0:2.6.32-358.el6.src",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-0:2.6.32-358.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-bootwrapper-0:2.6.32-358.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-debug-0:2.6.32-358.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-debug-0:2.6.32-358.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-debug-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-debug-0:2.6.32-358.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-debug-devel-0:2.6.32-358.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-debug-devel-0:2.6.32-358.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-debug-devel-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-debug-devel-0:2.6.32-358.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-debuginfo-0:2.6.32-358.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-debuginfo-0:2.6.32-358.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-debuginfo-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-debuginfo-0:2.6.32-358.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-devel-0:2.6.32-358.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-devel-0:2.6.32-358.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-devel-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-devel-0:2.6.32-358.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-358.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-doc-0:2.6.32-358.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-358.el6.noarch",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-358.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-firmware-0:2.6.32-358.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-358.el6.noarch",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-headers-0:2.6.32-358.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-headers-0:2.6.32-358.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-headers-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-headers-0:2.6.32-358.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-kdump-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-kdump-devel-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:perf-0:2.6.32-358.el6.i686"
},
"product_reference": "perf-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:perf-0:2.6.32-358.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:perf-0:2.6.32-358.el6.s390x"
},
"product_reference": "perf-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:perf-0:2.6.32-358.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:perf-debuginfo-0:2.6.32-358.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:perf-debuginfo-0:2.6.32-358.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:perf-debuginfo-0:2.6.32-358.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:perf-debuginfo-0:2.6.32-358.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:python-perf-0:2.6.32-358.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:python-perf-0:2.6.32-358.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:python-perf-0:2.6.32-358.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:python-perf-0:2.6.32-358.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:python-perf-debuginfo-0:2.6.32-358.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:python-perf-debuginfo-0:2.6.32-358.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:python-perf-debuginfo-0:2.6.32-358.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:python-perf-debuginfo-0:2.6.32-358.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-0:2.6.32-358.el6.i686"
},
"product_reference": "kernel-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-0:2.6.32-358.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-358.el6.src as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-0:2.6.32-358.el6.src"
},
"product_reference": "kernel-0:2.6.32-358.el6.src",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-0:2.6.32-358.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-bootwrapper-0:2.6.32-358.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-debug-0:2.6.32-358.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-debug-0:2.6.32-358.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-debug-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-debug-0:2.6.32-358.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-debug-debuginfo-0:2.6.32-358.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-debug-devel-0:2.6.32-358.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-debug-devel-0:2.6.32-358.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-debug-devel-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-debug-devel-0:2.6.32-358.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-debuginfo-0:2.6.32-358.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-debuginfo-0:2.6.32-358.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-debuginfo-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-debuginfo-0:2.6.32-358.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-devel-0:2.6.32-358.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-devel-0:2.6.32-358.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-devel-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-devel-0:2.6.32-358.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-358.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-doc-0:2.6.32-358.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-358.el6.noarch",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-358.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-firmware-0:2.6.32-358.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-358.el6.noarch",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-headers-0:2.6.32-358.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-headers-0:2.6.32-358.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-headers-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-headers-0:2.6.32-358.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-kdump-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-kdump-devel-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:perf-0:2.6.32-358.el6.i686"
},
"product_reference": "perf-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:perf-0:2.6.32-358.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:perf-0:2.6.32-358.el6.s390x"
},
"product_reference": "perf-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:perf-0:2.6.32-358.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:perf-debuginfo-0:2.6.32-358.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:perf-debuginfo-0:2.6.32-358.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:perf-debuginfo-0:2.6.32-358.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:perf-debuginfo-0:2.6.32-358.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:python-perf-0:2.6.32-358.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:python-perf-0:2.6.32-358.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:python-perf-0:2.6.32-358.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:python-perf-0:2.6.32-358.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:python-perf-debuginfo-0:2.6.32-358.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:python-perf-debuginfo-0:2.6.32-358.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:python-perf-debuginfo-0:2.6.32-358.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:python-perf-debuginfo-0:2.6.32-358.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-0:2.6.32-358.el6.i686"
},
"product_reference": "kernel-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-0:2.6.32-358.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-358.el6.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-0:2.6.32-358.el6.src"
},
"product_reference": "kernel-0:2.6.32-358.el6.src",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-0:2.6.32-358.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-358.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-debug-0:2.6.32-358.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-debug-0:2.6.32-358.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-debug-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-debug-0:2.6.32-358.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-358.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-358.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-358.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-358.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-358.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-358.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-devel-0:2.6.32-358.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-devel-0:2.6.32-358.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-devel-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-devel-0:2.6.32-358.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-358.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-doc-0:2.6.32-358.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-358.el6.noarch",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-358.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-firmware-0:2.6.32-358.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-358.el6.noarch",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-headers-0:2.6.32-358.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-headers-0:2.6.32-358.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-headers-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-headers-0:2.6.32-358.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-kdump-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:perf-0:2.6.32-358.el6.i686"
},
"product_reference": "perf-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:perf-0:2.6.32-358.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:perf-0:2.6.32-358.el6.s390x"
},
"product_reference": "perf-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:perf-0:2.6.32-358.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:perf-debuginfo-0:2.6.32-358.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:perf-debuginfo-0:2.6.32-358.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:perf-debuginfo-0:2.6.32-358.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:perf-debuginfo-0:2.6.32-358.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:python-perf-0:2.6.32-358.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:python-perf-0:2.6.32-358.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:python-perf-0:2.6.32-358.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:python-perf-0:2.6.32-358.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-358.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-358.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-358.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-358.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-0:2.6.32-358.el6.i686"
},
"product_reference": "kernel-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-0:2.6.32-358.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-358.el6.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-0:2.6.32-358.el6.src"
},
"product_reference": "kernel-0:2.6.32-358.el6.src",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-0:2.6.32-358.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-bootwrapper-0:2.6.32-358.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-debug-0:2.6.32-358.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-debug-0:2.6.32-358.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-debug-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-debug-0:2.6.32-358.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-358.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-debug-devel-0:2.6.32-358.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-debug-devel-0:2.6.32-358.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-debug-devel-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-debug-devel-0:2.6.32-358.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-debuginfo-0:2.6.32-358.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-debuginfo-0:2.6.32-358.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-debuginfo-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-debuginfo-0:2.6.32-358.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-devel-0:2.6.32-358.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-devel-0:2.6.32-358.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-devel-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-devel-0:2.6.32-358.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-358.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-doc-0:2.6.32-358.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-358.el6.noarch",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-358.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-firmware-0:2.6.32-358.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-358.el6.noarch",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-headers-0:2.6.32-358.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-headers-0:2.6.32-358.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-headers-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-headers-0:2.6.32-358.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-kdump-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-kdump-devel-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:perf-0:2.6.32-358.el6.i686"
},
"product_reference": "perf-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:perf-0:2.6.32-358.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:perf-0:2.6.32-358.el6.s390x"
},
"product_reference": "perf-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:perf-0:2.6.32-358.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:perf-debuginfo-0:2.6.32-358.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:perf-debuginfo-0:2.6.32-358.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:perf-debuginfo-0:2.6.32-358.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:perf-debuginfo-0:2.6.32-358.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:python-perf-0:2.6.32-358.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:python-perf-0:2.6.32-358.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:python-perf-0:2.6.32-358.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:python-perf-0:2.6.32-358.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:python-perf-debuginfo-0:2.6.32-358.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:python-perf-debuginfo-0:2.6.32-358.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:python-perf-debuginfo-0:2.6.32-358.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:python-perf-debuginfo-0:2.6.32-358.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-0:2.6.32-358.el6.i686"
},
"product_reference": "kernel-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-0:2.6.32-358.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-358.el6.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-0:2.6.32-358.el6.src"
},
"product_reference": "kernel-0:2.6.32-358.el6.src",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-0:2.6.32-358.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-bootwrapper-0:2.6.32-358.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-debug-0:2.6.32-358.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-debug-0:2.6.32-358.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-debug-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-debug-0:2.6.32-358.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-debug-devel-0:2.6.32-358.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-debug-devel-0:2.6.32-358.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-debug-devel-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-debug-devel-0:2.6.32-358.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-debuginfo-0:2.6.32-358.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-debuginfo-0:2.6.32-358.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-debuginfo-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-debuginfo-0:2.6.32-358.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-devel-0:2.6.32-358.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-devel-0:2.6.32-358.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-devel-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-devel-0:2.6.32-358.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-358.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-doc-0:2.6.32-358.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-358.el6.noarch",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-358.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-firmware-0:2.6.32-358.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-358.el6.noarch",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-headers-0:2.6.32-358.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-headers-0:2.6.32-358.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-headers-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-headers-0:2.6.32-358.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-kdump-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-kdump-devel-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:perf-0:2.6.32-358.el6.i686"
},
"product_reference": "perf-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:perf-0:2.6.32-358.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:perf-0:2.6.32-358.el6.s390x"
},
"product_reference": "perf-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:perf-0:2.6.32-358.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:perf-debuginfo-0:2.6.32-358.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:perf-debuginfo-0:2.6.32-358.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:perf-debuginfo-0:2.6.32-358.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:perf-debuginfo-0:2.6.32-358.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:python-perf-0:2.6.32-358.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:python-perf-0:2.6.32-358.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:python-perf-0:2.6.32-358.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:python-perf-0:2.6.32-358.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:python-perf-debuginfo-0:2.6.32-358.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:python-perf-debuginfo-0:2.6.32-358.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:python-perf-debuginfo-0:2.6.32-358.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:python-perf-debuginfo-0:2.6.32-358.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-0:2.6.32-358.el6.i686"
},
"product_reference": "kernel-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-0:2.6.32-358.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-358.el6.src as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-0:2.6.32-358.el6.src"
},
"product_reference": "kernel-0:2.6.32-358.el6.src",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-0:2.6.32-358.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-bootwrapper-0:2.6.32-358.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-debug-0:2.6.32-358.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-debug-0:2.6.32-358.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-debug-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-debug-0:2.6.32-358.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-debug-debuginfo-0:2.6.32-358.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-debug-devel-0:2.6.32-358.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-debug-devel-0:2.6.32-358.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-debug-devel-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-debug-devel-0:2.6.32-358.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-debuginfo-0:2.6.32-358.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-debuginfo-0:2.6.32-358.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-debuginfo-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-debuginfo-0:2.6.32-358.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-devel-0:2.6.32-358.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-devel-0:2.6.32-358.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-devel-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-devel-0:2.6.32-358.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-358.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-doc-0:2.6.32-358.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-358.el6.noarch",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-358.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-firmware-0:2.6.32-358.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-358.el6.noarch",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-headers-0:2.6.32-358.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-headers-0:2.6.32-358.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-headers-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-headers-0:2.6.32-358.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-kdump-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-kdump-devel-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:perf-0:2.6.32-358.el6.i686"
},
"product_reference": "perf-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:perf-0:2.6.32-358.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:perf-0:2.6.32-358.el6.s390x"
},
"product_reference": "perf-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:perf-0:2.6.32-358.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:perf-debuginfo-0:2.6.32-358.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:perf-debuginfo-0:2.6.32-358.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:perf-debuginfo-0:2.6.32-358.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:perf-debuginfo-0:2.6.32-358.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:python-perf-0:2.6.32-358.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:python-perf-0:2.6.32-358.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:python-perf-0:2.6.32-358.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:python-perf-0:2.6.32-358.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:python-perf-debuginfo-0:2.6.32-358.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:python-perf-debuginfo-0:2.6.32-358.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:python-perf-debuginfo-0:2.6.32-358.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:python-perf-debuginfo-0:2.6.32-358.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-0:2.6.32-358.el6.i686"
},
"product_reference": "kernel-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-0:2.6.32-358.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-358.el6.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-0:2.6.32-358.el6.src"
},
"product_reference": "kernel-0:2.6.32-358.el6.src",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-0:2.6.32-358.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-bootwrapper-0:2.6.32-358.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-debug-0:2.6.32-358.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-debug-0:2.6.32-358.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-debug-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-debug-0:2.6.32-358.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-debug-devel-0:2.6.32-358.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-debug-devel-0:2.6.32-358.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-debug-devel-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-debug-devel-0:2.6.32-358.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-debuginfo-0:2.6.32-358.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-debuginfo-0:2.6.32-358.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-debuginfo-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-debuginfo-0:2.6.32-358.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-devel-0:2.6.32-358.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-devel-0:2.6.32-358.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-devel-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-devel-0:2.6.32-358.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-358.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-doc-0:2.6.32-358.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-358.el6.noarch",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-358.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-firmware-0:2.6.32-358.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-358.el6.noarch",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-headers-0:2.6.32-358.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-headers-0:2.6.32-358.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-headers-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-headers-0:2.6.32-358.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-kdump-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-kdump-devel-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:perf-0:2.6.32-358.el6.i686"
},
"product_reference": "perf-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:perf-0:2.6.32-358.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:perf-0:2.6.32-358.el6.s390x"
},
"product_reference": "perf-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:perf-0:2.6.32-358.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:perf-debuginfo-0:2.6.32-358.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:perf-debuginfo-0:2.6.32-358.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:perf-debuginfo-0:2.6.32-358.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:perf-debuginfo-0:2.6.32-358.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:python-perf-0:2.6.32-358.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:python-perf-0:2.6.32-358.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:python-perf-0:2.6.32-358.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:python-perf-0:2.6.32-358.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:python-perf-debuginfo-0:2.6.32-358.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:python-perf-debuginfo-0:2.6.32-358.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:python-perf-debuginfo-0:2.6.32-358.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:python-perf-debuginfo-0:2.6.32-358.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-0:2.6.32-358.el6.i686"
},
"product_reference": "kernel-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-0:2.6.32-358.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-358.el6.src as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-0:2.6.32-358.el6.src"
},
"product_reference": "kernel-0:2.6.32-358.el6.src",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-0:2.6.32-358.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-bootwrapper-0:2.6.32-358.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-debug-0:2.6.32-358.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-debug-0:2.6.32-358.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-debug-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-debug-0:2.6.32-358.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-debug-debuginfo-0:2.6.32-358.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-debug-devel-0:2.6.32-358.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-debug-devel-0:2.6.32-358.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-debug-devel-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-debug-devel-0:2.6.32-358.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-debuginfo-0:2.6.32-358.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-debuginfo-0:2.6.32-358.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-debuginfo-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-debuginfo-0:2.6.32-358.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-devel-0:2.6.32-358.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-devel-0:2.6.32-358.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-devel-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-devel-0:2.6.32-358.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-358.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-doc-0:2.6.32-358.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-358.el6.noarch",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-358.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-firmware-0:2.6.32-358.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-358.el6.noarch",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-headers-0:2.6.32-358.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-headers-0:2.6.32-358.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-headers-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-headers-0:2.6.32-358.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-kdump-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-kdump-devel-0:2.6.32-358.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:perf-0:2.6.32-358.el6.i686"
},
"product_reference": "perf-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:perf-0:2.6.32-358.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:perf-0:2.6.32-358.el6.s390x"
},
"product_reference": "perf-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:perf-0:2.6.32-358.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:perf-debuginfo-0:2.6.32-358.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:perf-debuginfo-0:2.6.32-358.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:perf-debuginfo-0:2.6.32-358.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:perf-debuginfo-0:2.6.32-358.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:python-perf-0:2.6.32-358.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:python-perf-0:2.6.32-358.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:python-perf-0:2.6.32-358.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:python-perf-0:2.6.32-358.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-358.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:python-perf-debuginfo-0:2.6.32-358.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-358.el6.i686",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-358.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:python-perf-debuginfo-0:2.6.32-358.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-358.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:python-perf-debuginfo-0:2.6.32-358.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-358.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:python-perf-debuginfo-0:2.6.32-358.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"relates_to_product_reference": "6Workstation"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Theodore Ts\u0027o"
]
}
],
"cve": "CVE-2012-4508",
"discovery_date": "2012-10-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "869904"
}
],
"notes": [
{
"category": "description",
"text": "Race condition in fs/ext4/extents.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from a deleted file by reading an extent that was not properly marked as uninitialized.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ext4: AIO vs fallocate stale data exposure",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-optional:kernel-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-0:2.6.32-358.el6.src",
"6Client-optional:kernel-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-devel-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-devel-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-doc-0:2.6.32-358.el6.noarch",
"6Client-optional:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Client-optional:kernel-headers-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-headers-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Client-optional:perf-0:2.6.32-358.el6.i686",
"6Client-optional:perf-0:2.6.32-358.el6.ppc64",
"6Client-optional:perf-0:2.6.32-358.el6.s390x",
"6Client-optional:perf-0:2.6.32-358.el6.x86_64",
"6Client-optional:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Client-optional:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client-optional:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client-optional:python-perf-0:2.6.32-358.el6.i686",
"6Client-optional:python-perf-0:2.6.32-358.el6.ppc64",
"6Client-optional:python-perf-0:2.6.32-358.el6.s390x",
"6Client-optional:python-perf-0:2.6.32-358.el6.x86_64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Client-optional:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client:kernel-0:2.6.32-358.el6.i686",
"6Client:kernel-0:2.6.32-358.el6.ppc64",
"6Client:kernel-0:2.6.32-358.el6.s390x",
"6Client:kernel-0:2.6.32-358.el6.src",
"6Client:kernel-0:2.6.32-358.el6.x86_64",
"6Client:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-358.el6.i686",
"6Client:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-358.el6.s390x",
"6Client:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Client:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Client:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Client:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Client:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Client:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Client:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Client:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Client:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Client:kernel-devel-0:2.6.32-358.el6.i686",
"6Client:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Client:kernel-devel-0:2.6.32-358.el6.s390x",
"6Client:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Client:kernel-doc-0:2.6.32-358.el6.noarch",
"6Client:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Client:kernel-headers-0:2.6.32-358.el6.i686",
"6Client:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Client:kernel-headers-0:2.6.32-358.el6.s390x",
"6Client:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Client:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Client:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Client:perf-0:2.6.32-358.el6.i686",
"6Client:perf-0:2.6.32-358.el6.ppc64",
"6Client:perf-0:2.6.32-358.el6.s390x",
"6Client:perf-0:2.6.32-358.el6.x86_64",
"6Client:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Client:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client:python-perf-0:2.6.32-358.el6.i686",
"6Client:python-perf-0:2.6.32-358.el6.ppc64",
"6Client:python-perf-0:2.6.32-358.el6.s390x",
"6Client:python-perf-0:2.6.32-358.el6.x86_64",
"6Client:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Client:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.src",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debug-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debug-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-devel-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-devel-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-doc-0:2.6.32-358.el6.noarch",
"6ComputeNode-optional:kernel-firmware-0:2.6.32-358.el6.noarch",
"6ComputeNode-optional:kernel-headers-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-headers-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-headers-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-headers-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-kdump-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:perf-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:perf-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:python-perf-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:python-perf-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:python-perf-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:python-perf-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-0:2.6.32-358.el6.src",
"6ComputeNode:kernel-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debug-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debug-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-devel-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-devel-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-devel-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-doc-0:2.6.32-358.el6.noarch",
"6ComputeNode:kernel-firmware-0:2.6.32-358.el6.noarch",
"6ComputeNode:kernel-headers-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-headers-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-headers-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-headers-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-kdump-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode:perf-0:2.6.32-358.el6.i686",
"6ComputeNode:perf-0:2.6.32-358.el6.ppc64",
"6ComputeNode:perf-0:2.6.32-358.el6.s390x",
"6ComputeNode:perf-0:2.6.32-358.el6.x86_64",
"6ComputeNode:perf-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode:python-perf-0:2.6.32-358.el6.i686",
"6ComputeNode:python-perf-0:2.6.32-358.el6.ppc64",
"6ComputeNode:python-perf-0:2.6.32-358.el6.s390x",
"6ComputeNode:python-perf-0:2.6.32-358.el6.x86_64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-0:2.6.32-358.el6.src",
"6Server-optional:kernel-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-devel-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-devel-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-doc-0:2.6.32-358.el6.noarch",
"6Server-optional:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Server-optional:kernel-headers-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-headers-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Server-optional:perf-0:2.6.32-358.el6.i686",
"6Server-optional:perf-0:2.6.32-358.el6.ppc64",
"6Server-optional:perf-0:2.6.32-358.el6.s390x",
"6Server-optional:perf-0:2.6.32-358.el6.x86_64",
"6Server-optional:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Server-optional:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server-optional:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server-optional:python-perf-0:2.6.32-358.el6.i686",
"6Server-optional:python-perf-0:2.6.32-358.el6.ppc64",
"6Server-optional:python-perf-0:2.6.32-358.el6.s390x",
"6Server-optional:python-perf-0:2.6.32-358.el6.x86_64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Server-optional:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server:kernel-0:2.6.32-358.el6.i686",
"6Server:kernel-0:2.6.32-358.el6.ppc64",
"6Server:kernel-0:2.6.32-358.el6.s390x",
"6Server:kernel-0:2.6.32-358.el6.src",
"6Server:kernel-0:2.6.32-358.el6.x86_64",
"6Server:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-358.el6.i686",
"6Server:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-358.el6.s390x",
"6Server:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Server:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Server:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Server:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Server:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Server:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Server:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Server:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Server:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Server:kernel-devel-0:2.6.32-358.el6.i686",
"6Server:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Server:kernel-devel-0:2.6.32-358.el6.s390x",
"6Server:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Server:kernel-doc-0:2.6.32-358.el6.noarch",
"6Server:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Server:kernel-headers-0:2.6.32-358.el6.i686",
"6Server:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Server:kernel-headers-0:2.6.32-358.el6.s390x",
"6Server:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Server:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Server:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Server:perf-0:2.6.32-358.el6.i686",
"6Server:perf-0:2.6.32-358.el6.ppc64",
"6Server:perf-0:2.6.32-358.el6.s390x",
"6Server:perf-0:2.6.32-358.el6.x86_64",
"6Server:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Server:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server:python-perf-0:2.6.32-358.el6.i686",
"6Server:python-perf-0:2.6.32-358.el6.ppc64",
"6Server:python-perf-0:2.6.32-358.el6.s390x",
"6Server:python-perf-0:2.6.32-358.el6.x86_64",
"6Server:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Server:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-0:2.6.32-358.el6.src",
"6Workstation-optional:kernel-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-devel-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-devel-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-doc-0:2.6.32-358.el6.noarch",
"6Workstation-optional:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Workstation-optional:kernel-headers-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-headers-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-358.el6.i686",
"6Workstation-optional:perf-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:perf-0:2.6.32-358.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation-optional:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:python-perf-0:2.6.32-358.el6.i686",
"6Workstation-optional:python-perf-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:python-perf-0:2.6.32-358.el6.s390x",
"6Workstation-optional:python-perf-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-0:2.6.32-358.el6.i686",
"6Workstation:kernel-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-0:2.6.32-358.el6.src",
"6Workstation:kernel-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-devel-0:2.6.32-358.el6.i686",
"6Workstation:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-devel-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-doc-0:2.6.32-358.el6.noarch",
"6Workstation:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Workstation:kernel-headers-0:2.6.32-358.el6.i686",
"6Workstation:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-headers-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Workstation:perf-0:2.6.32-358.el6.i686",
"6Workstation:perf-0:2.6.32-358.el6.ppc64",
"6Workstation:perf-0:2.6.32-358.el6.s390x",
"6Workstation:perf-0:2.6.32-358.el6.x86_64",
"6Workstation:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation:python-perf-0:2.6.32-358.el6.i686",
"6Workstation:python-perf-0:2.6.32-358.el6.ppc64",
"6Workstation:python-perf-0:2.6.32-358.el6.s390x",
"6Workstation:python-perf-0:2.6.32-358.el6.x86_64",
"6Workstation:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:python-perf-debuginfo-0:2.6.32-358.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-4508"
},
{
"category": "external",
"summary": "RHBZ#869904",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=869904"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-4508",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4508"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-4508",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-4508"
}
],
"release_date": "2012-10-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-02-20T16:32:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"6Client-optional:kernel-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-0:2.6.32-358.el6.src",
"6Client-optional:kernel-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-devel-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-devel-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-doc-0:2.6.32-358.el6.noarch",
"6Client-optional:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Client-optional:kernel-headers-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-headers-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Client-optional:perf-0:2.6.32-358.el6.i686",
"6Client-optional:perf-0:2.6.32-358.el6.ppc64",
"6Client-optional:perf-0:2.6.32-358.el6.s390x",
"6Client-optional:perf-0:2.6.32-358.el6.x86_64",
"6Client-optional:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Client-optional:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client-optional:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client-optional:python-perf-0:2.6.32-358.el6.i686",
"6Client-optional:python-perf-0:2.6.32-358.el6.ppc64",
"6Client-optional:python-perf-0:2.6.32-358.el6.s390x",
"6Client-optional:python-perf-0:2.6.32-358.el6.x86_64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Client-optional:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client:kernel-0:2.6.32-358.el6.i686",
"6Client:kernel-0:2.6.32-358.el6.ppc64",
"6Client:kernel-0:2.6.32-358.el6.s390x",
"6Client:kernel-0:2.6.32-358.el6.src",
"6Client:kernel-0:2.6.32-358.el6.x86_64",
"6Client:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-358.el6.i686",
"6Client:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-358.el6.s390x",
"6Client:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Client:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Client:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Client:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Client:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Client:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Client:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Client:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Client:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Client:kernel-devel-0:2.6.32-358.el6.i686",
"6Client:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Client:kernel-devel-0:2.6.32-358.el6.s390x",
"6Client:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Client:kernel-doc-0:2.6.32-358.el6.noarch",
"6Client:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Client:kernel-headers-0:2.6.32-358.el6.i686",
"6Client:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Client:kernel-headers-0:2.6.32-358.el6.s390x",
"6Client:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Client:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Client:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Client:perf-0:2.6.32-358.el6.i686",
"6Client:perf-0:2.6.32-358.el6.ppc64",
"6Client:perf-0:2.6.32-358.el6.s390x",
"6Client:perf-0:2.6.32-358.el6.x86_64",
"6Client:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Client:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client:python-perf-0:2.6.32-358.el6.i686",
"6Client:python-perf-0:2.6.32-358.el6.ppc64",
"6Client:python-perf-0:2.6.32-358.el6.s390x",
"6Client:python-perf-0:2.6.32-358.el6.x86_64",
"6Client:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Client:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.src",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debug-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debug-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-devel-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-devel-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-doc-0:2.6.32-358.el6.noarch",
"6ComputeNode-optional:kernel-firmware-0:2.6.32-358.el6.noarch",
"6ComputeNode-optional:kernel-headers-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-headers-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-headers-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-headers-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-kdump-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:perf-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:perf-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:python-perf-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:python-perf-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:python-perf-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:python-perf-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-0:2.6.32-358.el6.src",
"6ComputeNode:kernel-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debug-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debug-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-devel-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-devel-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-devel-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-doc-0:2.6.32-358.el6.noarch",
"6ComputeNode:kernel-firmware-0:2.6.32-358.el6.noarch",
"6ComputeNode:kernel-headers-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-headers-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-headers-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-headers-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-kdump-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode:perf-0:2.6.32-358.el6.i686",
"6ComputeNode:perf-0:2.6.32-358.el6.ppc64",
"6ComputeNode:perf-0:2.6.32-358.el6.s390x",
"6ComputeNode:perf-0:2.6.32-358.el6.x86_64",
"6ComputeNode:perf-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode:python-perf-0:2.6.32-358.el6.i686",
"6ComputeNode:python-perf-0:2.6.32-358.el6.ppc64",
"6ComputeNode:python-perf-0:2.6.32-358.el6.s390x",
"6ComputeNode:python-perf-0:2.6.32-358.el6.x86_64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-0:2.6.32-358.el6.src",
"6Server-optional:kernel-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-devel-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-devel-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-doc-0:2.6.32-358.el6.noarch",
"6Server-optional:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Server-optional:kernel-headers-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-headers-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Server-optional:perf-0:2.6.32-358.el6.i686",
"6Server-optional:perf-0:2.6.32-358.el6.ppc64",
"6Server-optional:perf-0:2.6.32-358.el6.s390x",
"6Server-optional:perf-0:2.6.32-358.el6.x86_64",
"6Server-optional:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Server-optional:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server-optional:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server-optional:python-perf-0:2.6.32-358.el6.i686",
"6Server-optional:python-perf-0:2.6.32-358.el6.ppc64",
"6Server-optional:python-perf-0:2.6.32-358.el6.s390x",
"6Server-optional:python-perf-0:2.6.32-358.el6.x86_64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Server-optional:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server:kernel-0:2.6.32-358.el6.i686",
"6Server:kernel-0:2.6.32-358.el6.ppc64",
"6Server:kernel-0:2.6.32-358.el6.s390x",
"6Server:kernel-0:2.6.32-358.el6.src",
"6Server:kernel-0:2.6.32-358.el6.x86_64",
"6Server:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-358.el6.i686",
"6Server:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-358.el6.s390x",
"6Server:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Server:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Server:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Server:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Server:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Server:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Server:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Server:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Server:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Server:kernel-devel-0:2.6.32-358.el6.i686",
"6Server:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Server:kernel-devel-0:2.6.32-358.el6.s390x",
"6Server:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Server:kernel-doc-0:2.6.32-358.el6.noarch",
"6Server:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Server:kernel-headers-0:2.6.32-358.el6.i686",
"6Server:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Server:kernel-headers-0:2.6.32-358.el6.s390x",
"6Server:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Server:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Server:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Server:perf-0:2.6.32-358.el6.i686",
"6Server:perf-0:2.6.32-358.el6.ppc64",
"6Server:perf-0:2.6.32-358.el6.s390x",
"6Server:perf-0:2.6.32-358.el6.x86_64",
"6Server:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Server:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server:python-perf-0:2.6.32-358.el6.i686",
"6Server:python-perf-0:2.6.32-358.el6.ppc64",
"6Server:python-perf-0:2.6.32-358.el6.s390x",
"6Server:python-perf-0:2.6.32-358.el6.x86_64",
"6Server:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Server:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-0:2.6.32-358.el6.src",
"6Workstation-optional:kernel-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-devel-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-devel-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-doc-0:2.6.32-358.el6.noarch",
"6Workstation-optional:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Workstation-optional:kernel-headers-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-headers-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-358.el6.i686",
"6Workstation-optional:perf-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:perf-0:2.6.32-358.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation-optional:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:python-perf-0:2.6.32-358.el6.i686",
"6Workstation-optional:python-perf-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:python-perf-0:2.6.32-358.el6.s390x",
"6Workstation-optional:python-perf-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-0:2.6.32-358.el6.i686",
"6Workstation:kernel-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-0:2.6.32-358.el6.src",
"6Workstation:kernel-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-devel-0:2.6.32-358.el6.i686",
"6Workstation:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-devel-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-doc-0:2.6.32-358.el6.noarch",
"6Workstation:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Workstation:kernel-headers-0:2.6.32-358.el6.i686",
"6Workstation:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-headers-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Workstation:perf-0:2.6.32-358.el6.i686",
"6Workstation:perf-0:2.6.32-358.el6.ppc64",
"6Workstation:perf-0:2.6.32-358.el6.s390x",
"6Workstation:perf-0:2.6.32-358.el6.x86_64",
"6Workstation:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation:python-perf-0:2.6.32-358.el6.i686",
"6Workstation:python-perf-0:2.6.32-358.el6.ppc64",
"6Workstation:python-perf-0:2.6.32-358.el6.s390x",
"6Workstation:python-perf-0:2.6.32-358.el6.x86_64",
"6Workstation:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:python-perf-debuginfo-0:2.6.32-358.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2013:0496"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.9,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:N/A:N",
"version": "2.0"
},
"products": [
"6Client-optional:kernel-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-0:2.6.32-358.el6.src",
"6Client-optional:kernel-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-devel-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-devel-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-doc-0:2.6.32-358.el6.noarch",
"6Client-optional:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Client-optional:kernel-headers-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-headers-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Client-optional:perf-0:2.6.32-358.el6.i686",
"6Client-optional:perf-0:2.6.32-358.el6.ppc64",
"6Client-optional:perf-0:2.6.32-358.el6.s390x",
"6Client-optional:perf-0:2.6.32-358.el6.x86_64",
"6Client-optional:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Client-optional:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client-optional:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client-optional:python-perf-0:2.6.32-358.el6.i686",
"6Client-optional:python-perf-0:2.6.32-358.el6.ppc64",
"6Client-optional:python-perf-0:2.6.32-358.el6.s390x",
"6Client-optional:python-perf-0:2.6.32-358.el6.x86_64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Client-optional:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client:kernel-0:2.6.32-358.el6.i686",
"6Client:kernel-0:2.6.32-358.el6.ppc64",
"6Client:kernel-0:2.6.32-358.el6.s390x",
"6Client:kernel-0:2.6.32-358.el6.src",
"6Client:kernel-0:2.6.32-358.el6.x86_64",
"6Client:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-358.el6.i686",
"6Client:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-358.el6.s390x",
"6Client:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Client:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Client:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Client:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Client:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Client:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Client:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Client:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Client:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Client:kernel-devel-0:2.6.32-358.el6.i686",
"6Client:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Client:kernel-devel-0:2.6.32-358.el6.s390x",
"6Client:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Client:kernel-doc-0:2.6.32-358.el6.noarch",
"6Client:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Client:kernel-headers-0:2.6.32-358.el6.i686",
"6Client:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Client:kernel-headers-0:2.6.32-358.el6.s390x",
"6Client:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Client:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Client:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Client:perf-0:2.6.32-358.el6.i686",
"6Client:perf-0:2.6.32-358.el6.ppc64",
"6Client:perf-0:2.6.32-358.el6.s390x",
"6Client:perf-0:2.6.32-358.el6.x86_64",
"6Client:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Client:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client:python-perf-0:2.6.32-358.el6.i686",
"6Client:python-perf-0:2.6.32-358.el6.ppc64",
"6Client:python-perf-0:2.6.32-358.el6.s390x",
"6Client:python-perf-0:2.6.32-358.el6.x86_64",
"6Client:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Client:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.src",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debug-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debug-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-devel-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-devel-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-doc-0:2.6.32-358.el6.noarch",
"6ComputeNode-optional:kernel-firmware-0:2.6.32-358.el6.noarch",
"6ComputeNode-optional:kernel-headers-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-headers-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-headers-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-headers-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-kdump-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:perf-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:perf-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:python-perf-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:python-perf-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:python-perf-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:python-perf-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-0:2.6.32-358.el6.src",
"6ComputeNode:kernel-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debug-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debug-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-devel-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-devel-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-devel-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-doc-0:2.6.32-358.el6.noarch",
"6ComputeNode:kernel-firmware-0:2.6.32-358.el6.noarch",
"6ComputeNode:kernel-headers-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-headers-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-headers-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-headers-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-kdump-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode:perf-0:2.6.32-358.el6.i686",
"6ComputeNode:perf-0:2.6.32-358.el6.ppc64",
"6ComputeNode:perf-0:2.6.32-358.el6.s390x",
"6ComputeNode:perf-0:2.6.32-358.el6.x86_64",
"6ComputeNode:perf-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode:python-perf-0:2.6.32-358.el6.i686",
"6ComputeNode:python-perf-0:2.6.32-358.el6.ppc64",
"6ComputeNode:python-perf-0:2.6.32-358.el6.s390x",
"6ComputeNode:python-perf-0:2.6.32-358.el6.x86_64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-0:2.6.32-358.el6.src",
"6Server-optional:kernel-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-devel-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-devel-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-doc-0:2.6.32-358.el6.noarch",
"6Server-optional:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Server-optional:kernel-headers-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-headers-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Server-optional:perf-0:2.6.32-358.el6.i686",
"6Server-optional:perf-0:2.6.32-358.el6.ppc64",
"6Server-optional:perf-0:2.6.32-358.el6.s390x",
"6Server-optional:perf-0:2.6.32-358.el6.x86_64",
"6Server-optional:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Server-optional:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server-optional:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server-optional:python-perf-0:2.6.32-358.el6.i686",
"6Server-optional:python-perf-0:2.6.32-358.el6.ppc64",
"6Server-optional:python-perf-0:2.6.32-358.el6.s390x",
"6Server-optional:python-perf-0:2.6.32-358.el6.x86_64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Server-optional:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server:kernel-0:2.6.32-358.el6.i686",
"6Server:kernel-0:2.6.32-358.el6.ppc64",
"6Server:kernel-0:2.6.32-358.el6.s390x",
"6Server:kernel-0:2.6.32-358.el6.src",
"6Server:kernel-0:2.6.32-358.el6.x86_64",
"6Server:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-358.el6.i686",
"6Server:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-358.el6.s390x",
"6Server:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Server:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Server:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Server:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Server:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Server:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Server:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Server:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Server:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Server:kernel-devel-0:2.6.32-358.el6.i686",
"6Server:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Server:kernel-devel-0:2.6.32-358.el6.s390x",
"6Server:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Server:kernel-doc-0:2.6.32-358.el6.noarch",
"6Server:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Server:kernel-headers-0:2.6.32-358.el6.i686",
"6Server:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Server:kernel-headers-0:2.6.32-358.el6.s390x",
"6Server:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Server:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Server:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Server:perf-0:2.6.32-358.el6.i686",
"6Server:perf-0:2.6.32-358.el6.ppc64",
"6Server:perf-0:2.6.32-358.el6.s390x",
"6Server:perf-0:2.6.32-358.el6.x86_64",
"6Server:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Server:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server:python-perf-0:2.6.32-358.el6.i686",
"6Server:python-perf-0:2.6.32-358.el6.ppc64",
"6Server:python-perf-0:2.6.32-358.el6.s390x",
"6Server:python-perf-0:2.6.32-358.el6.x86_64",
"6Server:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Server:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-0:2.6.32-358.el6.src",
"6Workstation-optional:kernel-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-devel-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-devel-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-doc-0:2.6.32-358.el6.noarch",
"6Workstation-optional:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Workstation-optional:kernel-headers-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-headers-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-358.el6.i686",
"6Workstation-optional:perf-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:perf-0:2.6.32-358.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation-optional:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:python-perf-0:2.6.32-358.el6.i686",
"6Workstation-optional:python-perf-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:python-perf-0:2.6.32-358.el6.s390x",
"6Workstation-optional:python-perf-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-0:2.6.32-358.el6.i686",
"6Workstation:kernel-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-0:2.6.32-358.el6.src",
"6Workstation:kernel-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-devel-0:2.6.32-358.el6.i686",
"6Workstation:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-devel-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-doc-0:2.6.32-358.el6.noarch",
"6Workstation:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Workstation:kernel-headers-0:2.6.32-358.el6.i686",
"6Workstation:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-headers-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Workstation:perf-0:2.6.32-358.el6.i686",
"6Workstation:perf-0:2.6.32-358.el6.ppc64",
"6Workstation:perf-0:2.6.32-358.el6.s390x",
"6Workstation:perf-0:2.6.32-358.el6.x86_64",
"6Workstation:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation:python-perf-0:2.6.32-358.el6.i686",
"6Workstation:python-perf-0:2.6.32-358.el6.ppc64",
"6Workstation:python-perf-0:2.6.32-358.el6.s390x",
"6Workstation:python-perf-0:2.6.32-358.el6.x86_64",
"6Workstation:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:python-perf-debuginfo-0:2.6.32-358.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: ext4: AIO vs fallocate stale data exposure"
},
{
"acknowledgments": [
{
"names": [
"Paolo Bonzini"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2012-4542",
"discovery_date": "2012-10-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "875360"
}
],
"notes": [
{
"category": "description",
"text": "block/scsi_ioctl.c in the Linux kernel through 3.8 does not properly consider the SCSI device class during authorization of SCSI commands, which allows local users to bypass intended access restrictions via an SG_IO ioctl call that leverages overlapping opcodes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: block: default SCSI command filter does not accomodate commands overlap across device classes",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 7. Due to the lack of upstream patches and the Moderate impact, we are not planning to address this issue in Red Hat Enterprise Linux 7.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-optional:kernel-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-0:2.6.32-358.el6.src",
"6Client-optional:kernel-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-devel-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-devel-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-doc-0:2.6.32-358.el6.noarch",
"6Client-optional:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Client-optional:kernel-headers-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-headers-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Client-optional:perf-0:2.6.32-358.el6.i686",
"6Client-optional:perf-0:2.6.32-358.el6.ppc64",
"6Client-optional:perf-0:2.6.32-358.el6.s390x",
"6Client-optional:perf-0:2.6.32-358.el6.x86_64",
"6Client-optional:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Client-optional:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client-optional:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client-optional:python-perf-0:2.6.32-358.el6.i686",
"6Client-optional:python-perf-0:2.6.32-358.el6.ppc64",
"6Client-optional:python-perf-0:2.6.32-358.el6.s390x",
"6Client-optional:python-perf-0:2.6.32-358.el6.x86_64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Client-optional:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client:kernel-0:2.6.32-358.el6.i686",
"6Client:kernel-0:2.6.32-358.el6.ppc64",
"6Client:kernel-0:2.6.32-358.el6.s390x",
"6Client:kernel-0:2.6.32-358.el6.src",
"6Client:kernel-0:2.6.32-358.el6.x86_64",
"6Client:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-358.el6.i686",
"6Client:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-358.el6.s390x",
"6Client:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Client:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Client:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Client:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Client:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Client:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Client:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Client:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Client:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Client:kernel-devel-0:2.6.32-358.el6.i686",
"6Client:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Client:kernel-devel-0:2.6.32-358.el6.s390x",
"6Client:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Client:kernel-doc-0:2.6.32-358.el6.noarch",
"6Client:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Client:kernel-headers-0:2.6.32-358.el6.i686",
"6Client:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Client:kernel-headers-0:2.6.32-358.el6.s390x",
"6Client:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Client:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Client:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Client:perf-0:2.6.32-358.el6.i686",
"6Client:perf-0:2.6.32-358.el6.ppc64",
"6Client:perf-0:2.6.32-358.el6.s390x",
"6Client:perf-0:2.6.32-358.el6.x86_64",
"6Client:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Client:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client:python-perf-0:2.6.32-358.el6.i686",
"6Client:python-perf-0:2.6.32-358.el6.ppc64",
"6Client:python-perf-0:2.6.32-358.el6.s390x",
"6Client:python-perf-0:2.6.32-358.el6.x86_64",
"6Client:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Client:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.src",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debug-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debug-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-devel-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-devel-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-doc-0:2.6.32-358.el6.noarch",
"6ComputeNode-optional:kernel-firmware-0:2.6.32-358.el6.noarch",
"6ComputeNode-optional:kernel-headers-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-headers-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-headers-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-headers-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-kdump-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:perf-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:perf-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:python-perf-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:python-perf-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:python-perf-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:python-perf-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-0:2.6.32-358.el6.src",
"6ComputeNode:kernel-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debug-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debug-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-devel-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-devel-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-devel-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-doc-0:2.6.32-358.el6.noarch",
"6ComputeNode:kernel-firmware-0:2.6.32-358.el6.noarch",
"6ComputeNode:kernel-headers-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-headers-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-headers-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-headers-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-kdump-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode:perf-0:2.6.32-358.el6.i686",
"6ComputeNode:perf-0:2.6.32-358.el6.ppc64",
"6ComputeNode:perf-0:2.6.32-358.el6.s390x",
"6ComputeNode:perf-0:2.6.32-358.el6.x86_64",
"6ComputeNode:perf-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode:python-perf-0:2.6.32-358.el6.i686",
"6ComputeNode:python-perf-0:2.6.32-358.el6.ppc64",
"6ComputeNode:python-perf-0:2.6.32-358.el6.s390x",
"6ComputeNode:python-perf-0:2.6.32-358.el6.x86_64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-0:2.6.32-358.el6.src",
"6Server-optional:kernel-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-devel-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-devel-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-doc-0:2.6.32-358.el6.noarch",
"6Server-optional:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Server-optional:kernel-headers-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-headers-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Server-optional:perf-0:2.6.32-358.el6.i686",
"6Server-optional:perf-0:2.6.32-358.el6.ppc64",
"6Server-optional:perf-0:2.6.32-358.el6.s390x",
"6Server-optional:perf-0:2.6.32-358.el6.x86_64",
"6Server-optional:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Server-optional:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server-optional:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server-optional:python-perf-0:2.6.32-358.el6.i686",
"6Server-optional:python-perf-0:2.6.32-358.el6.ppc64",
"6Server-optional:python-perf-0:2.6.32-358.el6.s390x",
"6Server-optional:python-perf-0:2.6.32-358.el6.x86_64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Server-optional:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server:kernel-0:2.6.32-358.el6.i686",
"6Server:kernel-0:2.6.32-358.el6.ppc64",
"6Server:kernel-0:2.6.32-358.el6.s390x",
"6Server:kernel-0:2.6.32-358.el6.src",
"6Server:kernel-0:2.6.32-358.el6.x86_64",
"6Server:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-358.el6.i686",
"6Server:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-358.el6.s390x",
"6Server:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Server:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Server:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Server:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Server:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Server:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Server:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Server:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Server:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Server:kernel-devel-0:2.6.32-358.el6.i686",
"6Server:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Server:kernel-devel-0:2.6.32-358.el6.s390x",
"6Server:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Server:kernel-doc-0:2.6.32-358.el6.noarch",
"6Server:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Server:kernel-headers-0:2.6.32-358.el6.i686",
"6Server:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Server:kernel-headers-0:2.6.32-358.el6.s390x",
"6Server:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Server:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Server:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Server:perf-0:2.6.32-358.el6.i686",
"6Server:perf-0:2.6.32-358.el6.ppc64",
"6Server:perf-0:2.6.32-358.el6.s390x",
"6Server:perf-0:2.6.32-358.el6.x86_64",
"6Server:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Server:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server:python-perf-0:2.6.32-358.el6.i686",
"6Server:python-perf-0:2.6.32-358.el6.ppc64",
"6Server:python-perf-0:2.6.32-358.el6.s390x",
"6Server:python-perf-0:2.6.32-358.el6.x86_64",
"6Server:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Server:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-0:2.6.32-358.el6.src",
"6Workstation-optional:kernel-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-devel-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-devel-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-doc-0:2.6.32-358.el6.noarch",
"6Workstation-optional:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Workstation-optional:kernel-headers-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-headers-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-358.el6.i686",
"6Workstation-optional:perf-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:perf-0:2.6.32-358.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation-optional:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:python-perf-0:2.6.32-358.el6.i686",
"6Workstation-optional:python-perf-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:python-perf-0:2.6.32-358.el6.s390x",
"6Workstation-optional:python-perf-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-0:2.6.32-358.el6.i686",
"6Workstation:kernel-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-0:2.6.32-358.el6.src",
"6Workstation:kernel-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-devel-0:2.6.32-358.el6.i686",
"6Workstation:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-devel-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-doc-0:2.6.32-358.el6.noarch",
"6Workstation:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Workstation:kernel-headers-0:2.6.32-358.el6.i686",
"6Workstation:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-headers-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Workstation:perf-0:2.6.32-358.el6.i686",
"6Workstation:perf-0:2.6.32-358.el6.ppc64",
"6Workstation:perf-0:2.6.32-358.el6.s390x",
"6Workstation:perf-0:2.6.32-358.el6.x86_64",
"6Workstation:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation:python-perf-0:2.6.32-358.el6.i686",
"6Workstation:python-perf-0:2.6.32-358.el6.ppc64",
"6Workstation:python-perf-0:2.6.32-358.el6.s390x",
"6Workstation:python-perf-0:2.6.32-358.el6.x86_64",
"6Workstation:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:python-perf-debuginfo-0:2.6.32-358.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-4542"
},
{
"category": "external",
"summary": "RHBZ#875360",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=875360"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-4542",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4542"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-4542",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-4542"
}
],
"release_date": "2013-01-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-02-20T16:32:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"6Client-optional:kernel-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-0:2.6.32-358.el6.src",
"6Client-optional:kernel-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-devel-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-devel-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-doc-0:2.6.32-358.el6.noarch",
"6Client-optional:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Client-optional:kernel-headers-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-headers-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Client-optional:perf-0:2.6.32-358.el6.i686",
"6Client-optional:perf-0:2.6.32-358.el6.ppc64",
"6Client-optional:perf-0:2.6.32-358.el6.s390x",
"6Client-optional:perf-0:2.6.32-358.el6.x86_64",
"6Client-optional:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Client-optional:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client-optional:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client-optional:python-perf-0:2.6.32-358.el6.i686",
"6Client-optional:python-perf-0:2.6.32-358.el6.ppc64",
"6Client-optional:python-perf-0:2.6.32-358.el6.s390x",
"6Client-optional:python-perf-0:2.6.32-358.el6.x86_64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Client-optional:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client:kernel-0:2.6.32-358.el6.i686",
"6Client:kernel-0:2.6.32-358.el6.ppc64",
"6Client:kernel-0:2.6.32-358.el6.s390x",
"6Client:kernel-0:2.6.32-358.el6.src",
"6Client:kernel-0:2.6.32-358.el6.x86_64",
"6Client:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-358.el6.i686",
"6Client:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-358.el6.s390x",
"6Client:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Client:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Client:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Client:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Client:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Client:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Client:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Client:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Client:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Client:kernel-devel-0:2.6.32-358.el6.i686",
"6Client:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Client:kernel-devel-0:2.6.32-358.el6.s390x",
"6Client:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Client:kernel-doc-0:2.6.32-358.el6.noarch",
"6Client:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Client:kernel-headers-0:2.6.32-358.el6.i686",
"6Client:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Client:kernel-headers-0:2.6.32-358.el6.s390x",
"6Client:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Client:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Client:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Client:perf-0:2.6.32-358.el6.i686",
"6Client:perf-0:2.6.32-358.el6.ppc64",
"6Client:perf-0:2.6.32-358.el6.s390x",
"6Client:perf-0:2.6.32-358.el6.x86_64",
"6Client:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Client:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client:python-perf-0:2.6.32-358.el6.i686",
"6Client:python-perf-0:2.6.32-358.el6.ppc64",
"6Client:python-perf-0:2.6.32-358.el6.s390x",
"6Client:python-perf-0:2.6.32-358.el6.x86_64",
"6Client:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Client:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.src",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debug-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debug-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-devel-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-devel-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-doc-0:2.6.32-358.el6.noarch",
"6ComputeNode-optional:kernel-firmware-0:2.6.32-358.el6.noarch",
"6ComputeNode-optional:kernel-headers-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-headers-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-headers-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-headers-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-kdump-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:perf-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:perf-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:python-perf-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:python-perf-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:python-perf-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:python-perf-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-0:2.6.32-358.el6.src",
"6ComputeNode:kernel-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debug-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debug-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-devel-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-devel-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-devel-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-doc-0:2.6.32-358.el6.noarch",
"6ComputeNode:kernel-firmware-0:2.6.32-358.el6.noarch",
"6ComputeNode:kernel-headers-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-headers-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-headers-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-headers-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-kdump-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode:perf-0:2.6.32-358.el6.i686",
"6ComputeNode:perf-0:2.6.32-358.el6.ppc64",
"6ComputeNode:perf-0:2.6.32-358.el6.s390x",
"6ComputeNode:perf-0:2.6.32-358.el6.x86_64",
"6ComputeNode:perf-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode:python-perf-0:2.6.32-358.el6.i686",
"6ComputeNode:python-perf-0:2.6.32-358.el6.ppc64",
"6ComputeNode:python-perf-0:2.6.32-358.el6.s390x",
"6ComputeNode:python-perf-0:2.6.32-358.el6.x86_64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-0:2.6.32-358.el6.src",
"6Server-optional:kernel-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-devel-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-devel-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-doc-0:2.6.32-358.el6.noarch",
"6Server-optional:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Server-optional:kernel-headers-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-headers-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Server-optional:perf-0:2.6.32-358.el6.i686",
"6Server-optional:perf-0:2.6.32-358.el6.ppc64",
"6Server-optional:perf-0:2.6.32-358.el6.s390x",
"6Server-optional:perf-0:2.6.32-358.el6.x86_64",
"6Server-optional:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Server-optional:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server-optional:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server-optional:python-perf-0:2.6.32-358.el6.i686",
"6Server-optional:python-perf-0:2.6.32-358.el6.ppc64",
"6Server-optional:python-perf-0:2.6.32-358.el6.s390x",
"6Server-optional:python-perf-0:2.6.32-358.el6.x86_64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Server-optional:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server:kernel-0:2.6.32-358.el6.i686",
"6Server:kernel-0:2.6.32-358.el6.ppc64",
"6Server:kernel-0:2.6.32-358.el6.s390x",
"6Server:kernel-0:2.6.32-358.el6.src",
"6Server:kernel-0:2.6.32-358.el6.x86_64",
"6Server:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-358.el6.i686",
"6Server:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-358.el6.s390x",
"6Server:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Server:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Server:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Server:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Server:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Server:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Server:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Server:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Server:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Server:kernel-devel-0:2.6.32-358.el6.i686",
"6Server:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Server:kernel-devel-0:2.6.32-358.el6.s390x",
"6Server:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Server:kernel-doc-0:2.6.32-358.el6.noarch",
"6Server:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Server:kernel-headers-0:2.6.32-358.el6.i686",
"6Server:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Server:kernel-headers-0:2.6.32-358.el6.s390x",
"6Server:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Server:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Server:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Server:perf-0:2.6.32-358.el6.i686",
"6Server:perf-0:2.6.32-358.el6.ppc64",
"6Server:perf-0:2.6.32-358.el6.s390x",
"6Server:perf-0:2.6.32-358.el6.x86_64",
"6Server:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Server:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server:python-perf-0:2.6.32-358.el6.i686",
"6Server:python-perf-0:2.6.32-358.el6.ppc64",
"6Server:python-perf-0:2.6.32-358.el6.s390x",
"6Server:python-perf-0:2.6.32-358.el6.x86_64",
"6Server:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Server:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-0:2.6.32-358.el6.src",
"6Workstation-optional:kernel-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-devel-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-devel-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-doc-0:2.6.32-358.el6.noarch",
"6Workstation-optional:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Workstation-optional:kernel-headers-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-headers-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-358.el6.i686",
"6Workstation-optional:perf-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:perf-0:2.6.32-358.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation-optional:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:python-perf-0:2.6.32-358.el6.i686",
"6Workstation-optional:python-perf-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:python-perf-0:2.6.32-358.el6.s390x",
"6Workstation-optional:python-perf-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-0:2.6.32-358.el6.i686",
"6Workstation:kernel-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-0:2.6.32-358.el6.src",
"6Workstation:kernel-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-devel-0:2.6.32-358.el6.i686",
"6Workstation:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-devel-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-doc-0:2.6.32-358.el6.noarch",
"6Workstation:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Workstation:kernel-headers-0:2.6.32-358.el6.i686",
"6Workstation:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-headers-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Workstation:perf-0:2.6.32-358.el6.i686",
"6Workstation:perf-0:2.6.32-358.el6.ppc64",
"6Workstation:perf-0:2.6.32-358.el6.s390x",
"6Workstation:perf-0:2.6.32-358.el6.x86_64",
"6Workstation:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation:python-perf-0:2.6.32-358.el6.i686",
"6Workstation:python-perf-0:2.6.32-358.el6.ppc64",
"6Workstation:python-perf-0:2.6.32-358.el6.s390x",
"6Workstation:python-perf-0:2.6.32-358.el6.x86_64",
"6Workstation:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:python-perf-debuginfo-0:2.6.32-358.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2013:0496"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "ADJACENT_NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.9,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:A/AC:M/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"6Client-optional:kernel-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-0:2.6.32-358.el6.src",
"6Client-optional:kernel-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-devel-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-devel-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-doc-0:2.6.32-358.el6.noarch",
"6Client-optional:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Client-optional:kernel-headers-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-headers-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Client-optional:perf-0:2.6.32-358.el6.i686",
"6Client-optional:perf-0:2.6.32-358.el6.ppc64",
"6Client-optional:perf-0:2.6.32-358.el6.s390x",
"6Client-optional:perf-0:2.6.32-358.el6.x86_64",
"6Client-optional:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Client-optional:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client-optional:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client-optional:python-perf-0:2.6.32-358.el6.i686",
"6Client-optional:python-perf-0:2.6.32-358.el6.ppc64",
"6Client-optional:python-perf-0:2.6.32-358.el6.s390x",
"6Client-optional:python-perf-0:2.6.32-358.el6.x86_64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Client-optional:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client:kernel-0:2.6.32-358.el6.i686",
"6Client:kernel-0:2.6.32-358.el6.ppc64",
"6Client:kernel-0:2.6.32-358.el6.s390x",
"6Client:kernel-0:2.6.32-358.el6.src",
"6Client:kernel-0:2.6.32-358.el6.x86_64",
"6Client:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-358.el6.i686",
"6Client:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-358.el6.s390x",
"6Client:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Client:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Client:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Client:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Client:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Client:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Client:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Client:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Client:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Client:kernel-devel-0:2.6.32-358.el6.i686",
"6Client:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Client:kernel-devel-0:2.6.32-358.el6.s390x",
"6Client:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Client:kernel-doc-0:2.6.32-358.el6.noarch",
"6Client:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Client:kernel-headers-0:2.6.32-358.el6.i686",
"6Client:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Client:kernel-headers-0:2.6.32-358.el6.s390x",
"6Client:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Client:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Client:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Client:perf-0:2.6.32-358.el6.i686",
"6Client:perf-0:2.6.32-358.el6.ppc64",
"6Client:perf-0:2.6.32-358.el6.s390x",
"6Client:perf-0:2.6.32-358.el6.x86_64",
"6Client:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Client:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client:python-perf-0:2.6.32-358.el6.i686",
"6Client:python-perf-0:2.6.32-358.el6.ppc64",
"6Client:python-perf-0:2.6.32-358.el6.s390x",
"6Client:python-perf-0:2.6.32-358.el6.x86_64",
"6Client:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Client:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.src",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debug-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debug-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-devel-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-devel-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-doc-0:2.6.32-358.el6.noarch",
"6ComputeNode-optional:kernel-firmware-0:2.6.32-358.el6.noarch",
"6ComputeNode-optional:kernel-headers-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-headers-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-headers-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-headers-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-kdump-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:perf-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:perf-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:python-perf-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:python-perf-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:python-perf-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:python-perf-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-0:2.6.32-358.el6.src",
"6ComputeNode:kernel-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debug-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debug-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-devel-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-devel-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-devel-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-doc-0:2.6.32-358.el6.noarch",
"6ComputeNode:kernel-firmware-0:2.6.32-358.el6.noarch",
"6ComputeNode:kernel-headers-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-headers-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-headers-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-headers-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-kdump-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode:perf-0:2.6.32-358.el6.i686",
"6ComputeNode:perf-0:2.6.32-358.el6.ppc64",
"6ComputeNode:perf-0:2.6.32-358.el6.s390x",
"6ComputeNode:perf-0:2.6.32-358.el6.x86_64",
"6ComputeNode:perf-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode:python-perf-0:2.6.32-358.el6.i686",
"6ComputeNode:python-perf-0:2.6.32-358.el6.ppc64",
"6ComputeNode:python-perf-0:2.6.32-358.el6.s390x",
"6ComputeNode:python-perf-0:2.6.32-358.el6.x86_64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-0:2.6.32-358.el6.src",
"6Server-optional:kernel-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-devel-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-devel-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-doc-0:2.6.32-358.el6.noarch",
"6Server-optional:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Server-optional:kernel-headers-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-headers-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Server-optional:perf-0:2.6.32-358.el6.i686",
"6Server-optional:perf-0:2.6.32-358.el6.ppc64",
"6Server-optional:perf-0:2.6.32-358.el6.s390x",
"6Server-optional:perf-0:2.6.32-358.el6.x86_64",
"6Server-optional:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Server-optional:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server-optional:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server-optional:python-perf-0:2.6.32-358.el6.i686",
"6Server-optional:python-perf-0:2.6.32-358.el6.ppc64",
"6Server-optional:python-perf-0:2.6.32-358.el6.s390x",
"6Server-optional:python-perf-0:2.6.32-358.el6.x86_64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Server-optional:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server:kernel-0:2.6.32-358.el6.i686",
"6Server:kernel-0:2.6.32-358.el6.ppc64",
"6Server:kernel-0:2.6.32-358.el6.s390x",
"6Server:kernel-0:2.6.32-358.el6.src",
"6Server:kernel-0:2.6.32-358.el6.x86_64",
"6Server:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-358.el6.i686",
"6Server:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-358.el6.s390x",
"6Server:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Server:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Server:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Server:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Server:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Server:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Server:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Server:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Server:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Server:kernel-devel-0:2.6.32-358.el6.i686",
"6Server:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Server:kernel-devel-0:2.6.32-358.el6.s390x",
"6Server:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Server:kernel-doc-0:2.6.32-358.el6.noarch",
"6Server:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Server:kernel-headers-0:2.6.32-358.el6.i686",
"6Server:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Server:kernel-headers-0:2.6.32-358.el6.s390x",
"6Server:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Server:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Server:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Server:perf-0:2.6.32-358.el6.i686",
"6Server:perf-0:2.6.32-358.el6.ppc64",
"6Server:perf-0:2.6.32-358.el6.s390x",
"6Server:perf-0:2.6.32-358.el6.x86_64",
"6Server:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Server:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server:python-perf-0:2.6.32-358.el6.i686",
"6Server:python-perf-0:2.6.32-358.el6.ppc64",
"6Server:python-perf-0:2.6.32-358.el6.s390x",
"6Server:python-perf-0:2.6.32-358.el6.x86_64",
"6Server:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Server:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-0:2.6.32-358.el6.src",
"6Workstation-optional:kernel-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-devel-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-devel-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-doc-0:2.6.32-358.el6.noarch",
"6Workstation-optional:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Workstation-optional:kernel-headers-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-headers-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-358.el6.i686",
"6Workstation-optional:perf-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:perf-0:2.6.32-358.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation-optional:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:python-perf-0:2.6.32-358.el6.i686",
"6Workstation-optional:python-perf-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:python-perf-0:2.6.32-358.el6.s390x",
"6Workstation-optional:python-perf-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-0:2.6.32-358.el6.i686",
"6Workstation:kernel-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-0:2.6.32-358.el6.src",
"6Workstation:kernel-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-devel-0:2.6.32-358.el6.i686",
"6Workstation:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-devel-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-doc-0:2.6.32-358.el6.noarch",
"6Workstation:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Workstation:kernel-headers-0:2.6.32-358.el6.i686",
"6Workstation:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-headers-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Workstation:perf-0:2.6.32-358.el6.i686",
"6Workstation:perf-0:2.6.32-358.el6.ppc64",
"6Workstation:perf-0:2.6.32-358.el6.s390x",
"6Workstation:perf-0:2.6.32-358.el6.x86_64",
"6Workstation:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation:python-perf-0:2.6.32-358.el6.i686",
"6Workstation:python-perf-0:2.6.32-358.el6.ppc64",
"6Workstation:python-perf-0:2.6.32-358.el6.s390x",
"6Workstation:python-perf-0:2.6.32-358.el6.x86_64",
"6Workstation:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:python-perf-debuginfo-0:2.6.32-358.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: block: default SCSI command filter does not accomodate commands overlap across device classes"
},
{
"acknowledgments": [
{
"names": [
"Andrew Cooper"
],
"organization": "Citrix"
}
],
"cve": "CVE-2013-0190",
"discovery_date": "2013-01-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "896038"
}
],
"notes": [
{
"category": "description",
"text": "The xen_failsafe_callback function in Xen for the Linux kernel 2.6.23 and other versions, when running a 32-bit PVOPS guest, allows local users to cause a denial of service (guest crash) by triggering an iret fault, leading to use of an incorrect stack pointer and stack corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: stack corruption in xen_failsafe_callback()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect Red Hat Enterprise Linux 5 and Red Hat Enterprise MRG 2.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-optional:kernel-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-0:2.6.32-358.el6.src",
"6Client-optional:kernel-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-devel-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-devel-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-doc-0:2.6.32-358.el6.noarch",
"6Client-optional:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Client-optional:kernel-headers-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-headers-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Client-optional:perf-0:2.6.32-358.el6.i686",
"6Client-optional:perf-0:2.6.32-358.el6.ppc64",
"6Client-optional:perf-0:2.6.32-358.el6.s390x",
"6Client-optional:perf-0:2.6.32-358.el6.x86_64",
"6Client-optional:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Client-optional:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client-optional:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client-optional:python-perf-0:2.6.32-358.el6.i686",
"6Client-optional:python-perf-0:2.6.32-358.el6.ppc64",
"6Client-optional:python-perf-0:2.6.32-358.el6.s390x",
"6Client-optional:python-perf-0:2.6.32-358.el6.x86_64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Client-optional:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client:kernel-0:2.6.32-358.el6.i686",
"6Client:kernel-0:2.6.32-358.el6.ppc64",
"6Client:kernel-0:2.6.32-358.el6.s390x",
"6Client:kernel-0:2.6.32-358.el6.src",
"6Client:kernel-0:2.6.32-358.el6.x86_64",
"6Client:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-358.el6.i686",
"6Client:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-358.el6.s390x",
"6Client:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Client:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Client:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Client:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Client:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Client:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Client:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Client:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Client:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Client:kernel-devel-0:2.6.32-358.el6.i686",
"6Client:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Client:kernel-devel-0:2.6.32-358.el6.s390x",
"6Client:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Client:kernel-doc-0:2.6.32-358.el6.noarch",
"6Client:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Client:kernel-headers-0:2.6.32-358.el6.i686",
"6Client:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Client:kernel-headers-0:2.6.32-358.el6.s390x",
"6Client:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Client:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Client:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Client:perf-0:2.6.32-358.el6.i686",
"6Client:perf-0:2.6.32-358.el6.ppc64",
"6Client:perf-0:2.6.32-358.el6.s390x",
"6Client:perf-0:2.6.32-358.el6.x86_64",
"6Client:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Client:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client:python-perf-0:2.6.32-358.el6.i686",
"6Client:python-perf-0:2.6.32-358.el6.ppc64",
"6Client:python-perf-0:2.6.32-358.el6.s390x",
"6Client:python-perf-0:2.6.32-358.el6.x86_64",
"6Client:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Client:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.src",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debug-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debug-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-devel-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-devel-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-doc-0:2.6.32-358.el6.noarch",
"6ComputeNode-optional:kernel-firmware-0:2.6.32-358.el6.noarch",
"6ComputeNode-optional:kernel-headers-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-headers-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-headers-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-headers-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-kdump-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:perf-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:perf-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:python-perf-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:python-perf-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:python-perf-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:python-perf-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-0:2.6.32-358.el6.src",
"6ComputeNode:kernel-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debug-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debug-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-devel-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-devel-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-devel-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-doc-0:2.6.32-358.el6.noarch",
"6ComputeNode:kernel-firmware-0:2.6.32-358.el6.noarch",
"6ComputeNode:kernel-headers-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-headers-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-headers-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-headers-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-kdump-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode:perf-0:2.6.32-358.el6.i686",
"6ComputeNode:perf-0:2.6.32-358.el6.ppc64",
"6ComputeNode:perf-0:2.6.32-358.el6.s390x",
"6ComputeNode:perf-0:2.6.32-358.el6.x86_64",
"6ComputeNode:perf-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode:python-perf-0:2.6.32-358.el6.i686",
"6ComputeNode:python-perf-0:2.6.32-358.el6.ppc64",
"6ComputeNode:python-perf-0:2.6.32-358.el6.s390x",
"6ComputeNode:python-perf-0:2.6.32-358.el6.x86_64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-0:2.6.32-358.el6.src",
"6Server-optional:kernel-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-devel-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-devel-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-doc-0:2.6.32-358.el6.noarch",
"6Server-optional:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Server-optional:kernel-headers-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-headers-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Server-optional:perf-0:2.6.32-358.el6.i686",
"6Server-optional:perf-0:2.6.32-358.el6.ppc64",
"6Server-optional:perf-0:2.6.32-358.el6.s390x",
"6Server-optional:perf-0:2.6.32-358.el6.x86_64",
"6Server-optional:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Server-optional:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server-optional:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server-optional:python-perf-0:2.6.32-358.el6.i686",
"6Server-optional:python-perf-0:2.6.32-358.el6.ppc64",
"6Server-optional:python-perf-0:2.6.32-358.el6.s390x",
"6Server-optional:python-perf-0:2.6.32-358.el6.x86_64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Server-optional:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server:kernel-0:2.6.32-358.el6.i686",
"6Server:kernel-0:2.6.32-358.el6.ppc64",
"6Server:kernel-0:2.6.32-358.el6.s390x",
"6Server:kernel-0:2.6.32-358.el6.src",
"6Server:kernel-0:2.6.32-358.el6.x86_64",
"6Server:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-358.el6.i686",
"6Server:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-358.el6.s390x",
"6Server:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Server:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Server:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Server:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Server:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Server:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Server:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Server:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Server:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Server:kernel-devel-0:2.6.32-358.el6.i686",
"6Server:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Server:kernel-devel-0:2.6.32-358.el6.s390x",
"6Server:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Server:kernel-doc-0:2.6.32-358.el6.noarch",
"6Server:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Server:kernel-headers-0:2.6.32-358.el6.i686",
"6Server:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Server:kernel-headers-0:2.6.32-358.el6.s390x",
"6Server:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Server:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Server:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Server:perf-0:2.6.32-358.el6.i686",
"6Server:perf-0:2.6.32-358.el6.ppc64",
"6Server:perf-0:2.6.32-358.el6.s390x",
"6Server:perf-0:2.6.32-358.el6.x86_64",
"6Server:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Server:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server:python-perf-0:2.6.32-358.el6.i686",
"6Server:python-perf-0:2.6.32-358.el6.ppc64",
"6Server:python-perf-0:2.6.32-358.el6.s390x",
"6Server:python-perf-0:2.6.32-358.el6.x86_64",
"6Server:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Server:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-0:2.6.32-358.el6.src",
"6Workstation-optional:kernel-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-devel-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-devel-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-doc-0:2.6.32-358.el6.noarch",
"6Workstation-optional:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Workstation-optional:kernel-headers-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-headers-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-358.el6.i686",
"6Workstation-optional:perf-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:perf-0:2.6.32-358.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation-optional:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:python-perf-0:2.6.32-358.el6.i686",
"6Workstation-optional:python-perf-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:python-perf-0:2.6.32-358.el6.s390x",
"6Workstation-optional:python-perf-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-0:2.6.32-358.el6.i686",
"6Workstation:kernel-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-0:2.6.32-358.el6.src",
"6Workstation:kernel-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-devel-0:2.6.32-358.el6.i686",
"6Workstation:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-devel-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-doc-0:2.6.32-358.el6.noarch",
"6Workstation:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Workstation:kernel-headers-0:2.6.32-358.el6.i686",
"6Workstation:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-headers-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Workstation:perf-0:2.6.32-358.el6.i686",
"6Workstation:perf-0:2.6.32-358.el6.ppc64",
"6Workstation:perf-0:2.6.32-358.el6.s390x",
"6Workstation:perf-0:2.6.32-358.el6.x86_64",
"6Workstation:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation:python-perf-0:2.6.32-358.el6.i686",
"6Workstation:python-perf-0:2.6.32-358.el6.ppc64",
"6Workstation:python-perf-0:2.6.32-358.el6.s390x",
"6Workstation:python-perf-0:2.6.32-358.el6.x86_64",
"6Workstation:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:python-perf-debuginfo-0:2.6.32-358.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0190"
},
{
"category": "external",
"summary": "RHBZ#896038",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=896038"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0190",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0190"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0190",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0190"
}
],
"release_date": "2013-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-02-20T16:32:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"6Client-optional:kernel-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-0:2.6.32-358.el6.src",
"6Client-optional:kernel-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-devel-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-devel-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-doc-0:2.6.32-358.el6.noarch",
"6Client-optional:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Client-optional:kernel-headers-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-headers-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Client-optional:perf-0:2.6.32-358.el6.i686",
"6Client-optional:perf-0:2.6.32-358.el6.ppc64",
"6Client-optional:perf-0:2.6.32-358.el6.s390x",
"6Client-optional:perf-0:2.6.32-358.el6.x86_64",
"6Client-optional:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Client-optional:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client-optional:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client-optional:python-perf-0:2.6.32-358.el6.i686",
"6Client-optional:python-perf-0:2.6.32-358.el6.ppc64",
"6Client-optional:python-perf-0:2.6.32-358.el6.s390x",
"6Client-optional:python-perf-0:2.6.32-358.el6.x86_64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Client-optional:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client:kernel-0:2.6.32-358.el6.i686",
"6Client:kernel-0:2.6.32-358.el6.ppc64",
"6Client:kernel-0:2.6.32-358.el6.s390x",
"6Client:kernel-0:2.6.32-358.el6.src",
"6Client:kernel-0:2.6.32-358.el6.x86_64",
"6Client:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-358.el6.i686",
"6Client:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-358.el6.s390x",
"6Client:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Client:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Client:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Client:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Client:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Client:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Client:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Client:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Client:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Client:kernel-devel-0:2.6.32-358.el6.i686",
"6Client:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Client:kernel-devel-0:2.6.32-358.el6.s390x",
"6Client:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Client:kernel-doc-0:2.6.32-358.el6.noarch",
"6Client:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Client:kernel-headers-0:2.6.32-358.el6.i686",
"6Client:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Client:kernel-headers-0:2.6.32-358.el6.s390x",
"6Client:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Client:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Client:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Client:perf-0:2.6.32-358.el6.i686",
"6Client:perf-0:2.6.32-358.el6.ppc64",
"6Client:perf-0:2.6.32-358.el6.s390x",
"6Client:perf-0:2.6.32-358.el6.x86_64",
"6Client:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Client:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client:python-perf-0:2.6.32-358.el6.i686",
"6Client:python-perf-0:2.6.32-358.el6.ppc64",
"6Client:python-perf-0:2.6.32-358.el6.s390x",
"6Client:python-perf-0:2.6.32-358.el6.x86_64",
"6Client:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Client:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.src",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debug-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debug-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-devel-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-devel-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-doc-0:2.6.32-358.el6.noarch",
"6ComputeNode-optional:kernel-firmware-0:2.6.32-358.el6.noarch",
"6ComputeNode-optional:kernel-headers-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-headers-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-headers-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-headers-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-kdump-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:perf-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:perf-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:python-perf-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:python-perf-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:python-perf-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:python-perf-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-0:2.6.32-358.el6.src",
"6ComputeNode:kernel-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debug-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debug-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-devel-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-devel-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-devel-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-doc-0:2.6.32-358.el6.noarch",
"6ComputeNode:kernel-firmware-0:2.6.32-358.el6.noarch",
"6ComputeNode:kernel-headers-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-headers-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-headers-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-headers-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-kdump-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode:perf-0:2.6.32-358.el6.i686",
"6ComputeNode:perf-0:2.6.32-358.el6.ppc64",
"6ComputeNode:perf-0:2.6.32-358.el6.s390x",
"6ComputeNode:perf-0:2.6.32-358.el6.x86_64",
"6ComputeNode:perf-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode:python-perf-0:2.6.32-358.el6.i686",
"6ComputeNode:python-perf-0:2.6.32-358.el6.ppc64",
"6ComputeNode:python-perf-0:2.6.32-358.el6.s390x",
"6ComputeNode:python-perf-0:2.6.32-358.el6.x86_64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-0:2.6.32-358.el6.src",
"6Server-optional:kernel-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-devel-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-devel-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-doc-0:2.6.32-358.el6.noarch",
"6Server-optional:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Server-optional:kernel-headers-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-headers-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Server-optional:perf-0:2.6.32-358.el6.i686",
"6Server-optional:perf-0:2.6.32-358.el6.ppc64",
"6Server-optional:perf-0:2.6.32-358.el6.s390x",
"6Server-optional:perf-0:2.6.32-358.el6.x86_64",
"6Server-optional:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Server-optional:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server-optional:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server-optional:python-perf-0:2.6.32-358.el6.i686",
"6Server-optional:python-perf-0:2.6.32-358.el6.ppc64",
"6Server-optional:python-perf-0:2.6.32-358.el6.s390x",
"6Server-optional:python-perf-0:2.6.32-358.el6.x86_64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Server-optional:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server:kernel-0:2.6.32-358.el6.i686",
"6Server:kernel-0:2.6.32-358.el6.ppc64",
"6Server:kernel-0:2.6.32-358.el6.s390x",
"6Server:kernel-0:2.6.32-358.el6.src",
"6Server:kernel-0:2.6.32-358.el6.x86_64",
"6Server:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-358.el6.i686",
"6Server:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-358.el6.s390x",
"6Server:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Server:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Server:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Server:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Server:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Server:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Server:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Server:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Server:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Server:kernel-devel-0:2.6.32-358.el6.i686",
"6Server:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Server:kernel-devel-0:2.6.32-358.el6.s390x",
"6Server:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Server:kernel-doc-0:2.6.32-358.el6.noarch",
"6Server:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Server:kernel-headers-0:2.6.32-358.el6.i686",
"6Server:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Server:kernel-headers-0:2.6.32-358.el6.s390x",
"6Server:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Server:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Server:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Server:perf-0:2.6.32-358.el6.i686",
"6Server:perf-0:2.6.32-358.el6.ppc64",
"6Server:perf-0:2.6.32-358.el6.s390x",
"6Server:perf-0:2.6.32-358.el6.x86_64",
"6Server:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Server:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server:python-perf-0:2.6.32-358.el6.i686",
"6Server:python-perf-0:2.6.32-358.el6.ppc64",
"6Server:python-perf-0:2.6.32-358.el6.s390x",
"6Server:python-perf-0:2.6.32-358.el6.x86_64",
"6Server:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Server:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-0:2.6.32-358.el6.src",
"6Workstation-optional:kernel-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-devel-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-devel-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-doc-0:2.6.32-358.el6.noarch",
"6Workstation-optional:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Workstation-optional:kernel-headers-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-headers-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-358.el6.i686",
"6Workstation-optional:perf-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:perf-0:2.6.32-358.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation-optional:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:python-perf-0:2.6.32-358.el6.i686",
"6Workstation-optional:python-perf-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:python-perf-0:2.6.32-358.el6.s390x",
"6Workstation-optional:python-perf-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-0:2.6.32-358.el6.i686",
"6Workstation:kernel-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-0:2.6.32-358.el6.src",
"6Workstation:kernel-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-devel-0:2.6.32-358.el6.i686",
"6Workstation:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-devel-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-doc-0:2.6.32-358.el6.noarch",
"6Workstation:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Workstation:kernel-headers-0:2.6.32-358.el6.i686",
"6Workstation:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-headers-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Workstation:perf-0:2.6.32-358.el6.i686",
"6Workstation:perf-0:2.6.32-358.el6.ppc64",
"6Workstation:perf-0:2.6.32-358.el6.s390x",
"6Workstation:perf-0:2.6.32-358.el6.x86_64",
"6Workstation:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation:python-perf-0:2.6.32-358.el6.i686",
"6Workstation:python-perf-0:2.6.32-358.el6.ppc64",
"6Workstation:python-perf-0:2.6.32-358.el6.s390x",
"6Workstation:python-perf-0:2.6.32-358.el6.x86_64",
"6Workstation:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:python-perf-debuginfo-0:2.6.32-358.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2013:0496"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 4.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:H/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"products": [
"6Client-optional:kernel-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-0:2.6.32-358.el6.src",
"6Client-optional:kernel-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-devel-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-devel-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-doc-0:2.6.32-358.el6.noarch",
"6Client-optional:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Client-optional:kernel-headers-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-headers-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Client-optional:perf-0:2.6.32-358.el6.i686",
"6Client-optional:perf-0:2.6.32-358.el6.ppc64",
"6Client-optional:perf-0:2.6.32-358.el6.s390x",
"6Client-optional:perf-0:2.6.32-358.el6.x86_64",
"6Client-optional:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Client-optional:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client-optional:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client-optional:python-perf-0:2.6.32-358.el6.i686",
"6Client-optional:python-perf-0:2.6.32-358.el6.ppc64",
"6Client-optional:python-perf-0:2.6.32-358.el6.s390x",
"6Client-optional:python-perf-0:2.6.32-358.el6.x86_64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Client-optional:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client:kernel-0:2.6.32-358.el6.i686",
"6Client:kernel-0:2.6.32-358.el6.ppc64",
"6Client:kernel-0:2.6.32-358.el6.s390x",
"6Client:kernel-0:2.6.32-358.el6.src",
"6Client:kernel-0:2.6.32-358.el6.x86_64",
"6Client:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-358.el6.i686",
"6Client:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-358.el6.s390x",
"6Client:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Client:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Client:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Client:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Client:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Client:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Client:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Client:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Client:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Client:kernel-devel-0:2.6.32-358.el6.i686",
"6Client:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Client:kernel-devel-0:2.6.32-358.el6.s390x",
"6Client:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Client:kernel-doc-0:2.6.32-358.el6.noarch",
"6Client:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Client:kernel-headers-0:2.6.32-358.el6.i686",
"6Client:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Client:kernel-headers-0:2.6.32-358.el6.s390x",
"6Client:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Client:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Client:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Client:perf-0:2.6.32-358.el6.i686",
"6Client:perf-0:2.6.32-358.el6.ppc64",
"6Client:perf-0:2.6.32-358.el6.s390x",
"6Client:perf-0:2.6.32-358.el6.x86_64",
"6Client:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Client:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client:python-perf-0:2.6.32-358.el6.i686",
"6Client:python-perf-0:2.6.32-358.el6.ppc64",
"6Client:python-perf-0:2.6.32-358.el6.s390x",
"6Client:python-perf-0:2.6.32-358.el6.x86_64",
"6Client:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Client:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.src",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debug-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debug-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-devel-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-devel-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-doc-0:2.6.32-358.el6.noarch",
"6ComputeNode-optional:kernel-firmware-0:2.6.32-358.el6.noarch",
"6ComputeNode-optional:kernel-headers-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-headers-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-headers-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-headers-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-kdump-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:perf-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:perf-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:python-perf-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:python-perf-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:python-perf-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:python-perf-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-0:2.6.32-358.el6.src",
"6ComputeNode:kernel-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debug-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debug-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-devel-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-devel-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-devel-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-doc-0:2.6.32-358.el6.noarch",
"6ComputeNode:kernel-firmware-0:2.6.32-358.el6.noarch",
"6ComputeNode:kernel-headers-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-headers-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-headers-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-headers-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-kdump-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode:perf-0:2.6.32-358.el6.i686",
"6ComputeNode:perf-0:2.6.32-358.el6.ppc64",
"6ComputeNode:perf-0:2.6.32-358.el6.s390x",
"6ComputeNode:perf-0:2.6.32-358.el6.x86_64",
"6ComputeNode:perf-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode:python-perf-0:2.6.32-358.el6.i686",
"6ComputeNode:python-perf-0:2.6.32-358.el6.ppc64",
"6ComputeNode:python-perf-0:2.6.32-358.el6.s390x",
"6ComputeNode:python-perf-0:2.6.32-358.el6.x86_64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-0:2.6.32-358.el6.src",
"6Server-optional:kernel-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-devel-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-devel-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-doc-0:2.6.32-358.el6.noarch",
"6Server-optional:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Server-optional:kernel-headers-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-headers-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Server-optional:perf-0:2.6.32-358.el6.i686",
"6Server-optional:perf-0:2.6.32-358.el6.ppc64",
"6Server-optional:perf-0:2.6.32-358.el6.s390x",
"6Server-optional:perf-0:2.6.32-358.el6.x86_64",
"6Server-optional:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Server-optional:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server-optional:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server-optional:python-perf-0:2.6.32-358.el6.i686",
"6Server-optional:python-perf-0:2.6.32-358.el6.ppc64",
"6Server-optional:python-perf-0:2.6.32-358.el6.s390x",
"6Server-optional:python-perf-0:2.6.32-358.el6.x86_64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Server-optional:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server:kernel-0:2.6.32-358.el6.i686",
"6Server:kernel-0:2.6.32-358.el6.ppc64",
"6Server:kernel-0:2.6.32-358.el6.s390x",
"6Server:kernel-0:2.6.32-358.el6.src",
"6Server:kernel-0:2.6.32-358.el6.x86_64",
"6Server:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-358.el6.i686",
"6Server:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-358.el6.s390x",
"6Server:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Server:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Server:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Server:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Server:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Server:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Server:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Server:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Server:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Server:kernel-devel-0:2.6.32-358.el6.i686",
"6Server:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Server:kernel-devel-0:2.6.32-358.el6.s390x",
"6Server:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Server:kernel-doc-0:2.6.32-358.el6.noarch",
"6Server:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Server:kernel-headers-0:2.6.32-358.el6.i686",
"6Server:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Server:kernel-headers-0:2.6.32-358.el6.s390x",
"6Server:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Server:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Server:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Server:perf-0:2.6.32-358.el6.i686",
"6Server:perf-0:2.6.32-358.el6.ppc64",
"6Server:perf-0:2.6.32-358.el6.s390x",
"6Server:perf-0:2.6.32-358.el6.x86_64",
"6Server:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Server:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server:python-perf-0:2.6.32-358.el6.i686",
"6Server:python-perf-0:2.6.32-358.el6.ppc64",
"6Server:python-perf-0:2.6.32-358.el6.s390x",
"6Server:python-perf-0:2.6.32-358.el6.x86_64",
"6Server:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Server:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-0:2.6.32-358.el6.src",
"6Workstation-optional:kernel-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-devel-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-devel-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-doc-0:2.6.32-358.el6.noarch",
"6Workstation-optional:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Workstation-optional:kernel-headers-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-headers-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-358.el6.i686",
"6Workstation-optional:perf-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:perf-0:2.6.32-358.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation-optional:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:python-perf-0:2.6.32-358.el6.i686",
"6Workstation-optional:python-perf-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:python-perf-0:2.6.32-358.el6.s390x",
"6Workstation-optional:python-perf-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-0:2.6.32-358.el6.i686",
"6Workstation:kernel-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-0:2.6.32-358.el6.src",
"6Workstation:kernel-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-devel-0:2.6.32-358.el6.i686",
"6Workstation:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-devel-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-doc-0:2.6.32-358.el6.noarch",
"6Workstation:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Workstation:kernel-headers-0:2.6.32-358.el6.i686",
"6Workstation:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-headers-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Workstation:perf-0:2.6.32-358.el6.i686",
"6Workstation:perf-0:2.6.32-358.el6.ppc64",
"6Workstation:perf-0:2.6.32-358.el6.s390x",
"6Workstation:perf-0:2.6.32-358.el6.x86_64",
"6Workstation:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation:python-perf-0:2.6.32-358.el6.i686",
"6Workstation:python-perf-0:2.6.32-358.el6.ppc64",
"6Workstation:python-perf-0:2.6.32-358.el6.s390x",
"6Workstation:python-perf-0:2.6.32-358.el6.x86_64",
"6Workstation:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:python-perf-debuginfo-0:2.6.32-358.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: stack corruption in xen_failsafe_callback()"
},
{
"cve": "CVE-2013-0309",
"discovery_date": "2013-02-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "912898"
}
],
"notes": [
{
"category": "description",
"text": "arch/x86/include/asm/pgtable.h in the Linux kernel before 3.6.2, when transparent huge pages are used, does not properly support PROT_NONE memory regions, which allows local users to cause a denial of service (system crash) via a crafted application.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mm: thp: pmd_present and PROT_NONE local DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did affect the version of Linux kernel as shipped with Red Hat Enterprise Linux 6.\n\nThis issue did not affect the version of Linux kernel as shipped with Red Hat Enterprise Linux 5 and Red Hat Enterprise MRG 2.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-optional:kernel-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-0:2.6.32-358.el6.src",
"6Client-optional:kernel-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-devel-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-devel-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-doc-0:2.6.32-358.el6.noarch",
"6Client-optional:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Client-optional:kernel-headers-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-headers-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Client-optional:perf-0:2.6.32-358.el6.i686",
"6Client-optional:perf-0:2.6.32-358.el6.ppc64",
"6Client-optional:perf-0:2.6.32-358.el6.s390x",
"6Client-optional:perf-0:2.6.32-358.el6.x86_64",
"6Client-optional:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Client-optional:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client-optional:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client-optional:python-perf-0:2.6.32-358.el6.i686",
"6Client-optional:python-perf-0:2.6.32-358.el6.ppc64",
"6Client-optional:python-perf-0:2.6.32-358.el6.s390x",
"6Client-optional:python-perf-0:2.6.32-358.el6.x86_64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Client-optional:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client:kernel-0:2.6.32-358.el6.i686",
"6Client:kernel-0:2.6.32-358.el6.ppc64",
"6Client:kernel-0:2.6.32-358.el6.s390x",
"6Client:kernel-0:2.6.32-358.el6.src",
"6Client:kernel-0:2.6.32-358.el6.x86_64",
"6Client:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-358.el6.i686",
"6Client:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-358.el6.s390x",
"6Client:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Client:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Client:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Client:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Client:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Client:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Client:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Client:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Client:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Client:kernel-devel-0:2.6.32-358.el6.i686",
"6Client:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Client:kernel-devel-0:2.6.32-358.el6.s390x",
"6Client:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Client:kernel-doc-0:2.6.32-358.el6.noarch",
"6Client:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Client:kernel-headers-0:2.6.32-358.el6.i686",
"6Client:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Client:kernel-headers-0:2.6.32-358.el6.s390x",
"6Client:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Client:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Client:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Client:perf-0:2.6.32-358.el6.i686",
"6Client:perf-0:2.6.32-358.el6.ppc64",
"6Client:perf-0:2.6.32-358.el6.s390x",
"6Client:perf-0:2.6.32-358.el6.x86_64",
"6Client:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Client:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client:python-perf-0:2.6.32-358.el6.i686",
"6Client:python-perf-0:2.6.32-358.el6.ppc64",
"6Client:python-perf-0:2.6.32-358.el6.s390x",
"6Client:python-perf-0:2.6.32-358.el6.x86_64",
"6Client:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Client:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.src",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debug-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debug-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-devel-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-devel-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-doc-0:2.6.32-358.el6.noarch",
"6ComputeNode-optional:kernel-firmware-0:2.6.32-358.el6.noarch",
"6ComputeNode-optional:kernel-headers-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-headers-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-headers-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-headers-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-kdump-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:perf-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:perf-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:python-perf-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:python-perf-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:python-perf-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:python-perf-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-0:2.6.32-358.el6.src",
"6ComputeNode:kernel-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debug-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debug-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-devel-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-devel-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-devel-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-doc-0:2.6.32-358.el6.noarch",
"6ComputeNode:kernel-firmware-0:2.6.32-358.el6.noarch",
"6ComputeNode:kernel-headers-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-headers-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-headers-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-headers-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-kdump-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode:perf-0:2.6.32-358.el6.i686",
"6ComputeNode:perf-0:2.6.32-358.el6.ppc64",
"6ComputeNode:perf-0:2.6.32-358.el6.s390x",
"6ComputeNode:perf-0:2.6.32-358.el6.x86_64",
"6ComputeNode:perf-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode:python-perf-0:2.6.32-358.el6.i686",
"6ComputeNode:python-perf-0:2.6.32-358.el6.ppc64",
"6ComputeNode:python-perf-0:2.6.32-358.el6.s390x",
"6ComputeNode:python-perf-0:2.6.32-358.el6.x86_64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-0:2.6.32-358.el6.src",
"6Server-optional:kernel-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-devel-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-devel-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-doc-0:2.6.32-358.el6.noarch",
"6Server-optional:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Server-optional:kernel-headers-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-headers-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Server-optional:perf-0:2.6.32-358.el6.i686",
"6Server-optional:perf-0:2.6.32-358.el6.ppc64",
"6Server-optional:perf-0:2.6.32-358.el6.s390x",
"6Server-optional:perf-0:2.6.32-358.el6.x86_64",
"6Server-optional:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Server-optional:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server-optional:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server-optional:python-perf-0:2.6.32-358.el6.i686",
"6Server-optional:python-perf-0:2.6.32-358.el6.ppc64",
"6Server-optional:python-perf-0:2.6.32-358.el6.s390x",
"6Server-optional:python-perf-0:2.6.32-358.el6.x86_64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Server-optional:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server:kernel-0:2.6.32-358.el6.i686",
"6Server:kernel-0:2.6.32-358.el6.ppc64",
"6Server:kernel-0:2.6.32-358.el6.s390x",
"6Server:kernel-0:2.6.32-358.el6.src",
"6Server:kernel-0:2.6.32-358.el6.x86_64",
"6Server:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-358.el6.i686",
"6Server:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-358.el6.s390x",
"6Server:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Server:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Server:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Server:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Server:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Server:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Server:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Server:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Server:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Server:kernel-devel-0:2.6.32-358.el6.i686",
"6Server:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Server:kernel-devel-0:2.6.32-358.el6.s390x",
"6Server:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Server:kernel-doc-0:2.6.32-358.el6.noarch",
"6Server:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Server:kernel-headers-0:2.6.32-358.el6.i686",
"6Server:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Server:kernel-headers-0:2.6.32-358.el6.s390x",
"6Server:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Server:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Server:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Server:perf-0:2.6.32-358.el6.i686",
"6Server:perf-0:2.6.32-358.el6.ppc64",
"6Server:perf-0:2.6.32-358.el6.s390x",
"6Server:perf-0:2.6.32-358.el6.x86_64",
"6Server:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Server:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server:python-perf-0:2.6.32-358.el6.i686",
"6Server:python-perf-0:2.6.32-358.el6.ppc64",
"6Server:python-perf-0:2.6.32-358.el6.s390x",
"6Server:python-perf-0:2.6.32-358.el6.x86_64",
"6Server:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Server:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-0:2.6.32-358.el6.src",
"6Workstation-optional:kernel-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-devel-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-devel-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-doc-0:2.6.32-358.el6.noarch",
"6Workstation-optional:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Workstation-optional:kernel-headers-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-headers-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-358.el6.i686",
"6Workstation-optional:perf-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:perf-0:2.6.32-358.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation-optional:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:python-perf-0:2.6.32-358.el6.i686",
"6Workstation-optional:python-perf-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:python-perf-0:2.6.32-358.el6.s390x",
"6Workstation-optional:python-perf-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-0:2.6.32-358.el6.i686",
"6Workstation:kernel-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-0:2.6.32-358.el6.src",
"6Workstation:kernel-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-devel-0:2.6.32-358.el6.i686",
"6Workstation:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-devel-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-doc-0:2.6.32-358.el6.noarch",
"6Workstation:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Workstation:kernel-headers-0:2.6.32-358.el6.i686",
"6Workstation:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-headers-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Workstation:perf-0:2.6.32-358.el6.i686",
"6Workstation:perf-0:2.6.32-358.el6.ppc64",
"6Workstation:perf-0:2.6.32-358.el6.s390x",
"6Workstation:perf-0:2.6.32-358.el6.x86_64",
"6Workstation:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation:python-perf-0:2.6.32-358.el6.i686",
"6Workstation:python-perf-0:2.6.32-358.el6.ppc64",
"6Workstation:python-perf-0:2.6.32-358.el6.s390x",
"6Workstation:python-perf-0:2.6.32-358.el6.x86_64",
"6Workstation:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:python-perf-debuginfo-0:2.6.32-358.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0309"
},
{
"category": "external",
"summary": "RHBZ#912898",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=912898"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0309",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0309"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0309",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0309"
}
],
"release_date": "2013-02-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-02-20T16:32:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"6Client-optional:kernel-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-0:2.6.32-358.el6.src",
"6Client-optional:kernel-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-devel-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-devel-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-doc-0:2.6.32-358.el6.noarch",
"6Client-optional:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Client-optional:kernel-headers-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-headers-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Client-optional:perf-0:2.6.32-358.el6.i686",
"6Client-optional:perf-0:2.6.32-358.el6.ppc64",
"6Client-optional:perf-0:2.6.32-358.el6.s390x",
"6Client-optional:perf-0:2.6.32-358.el6.x86_64",
"6Client-optional:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Client-optional:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client-optional:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client-optional:python-perf-0:2.6.32-358.el6.i686",
"6Client-optional:python-perf-0:2.6.32-358.el6.ppc64",
"6Client-optional:python-perf-0:2.6.32-358.el6.s390x",
"6Client-optional:python-perf-0:2.6.32-358.el6.x86_64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Client-optional:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client:kernel-0:2.6.32-358.el6.i686",
"6Client:kernel-0:2.6.32-358.el6.ppc64",
"6Client:kernel-0:2.6.32-358.el6.s390x",
"6Client:kernel-0:2.6.32-358.el6.src",
"6Client:kernel-0:2.6.32-358.el6.x86_64",
"6Client:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-358.el6.i686",
"6Client:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-358.el6.s390x",
"6Client:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Client:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Client:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Client:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Client:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Client:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Client:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Client:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Client:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Client:kernel-devel-0:2.6.32-358.el6.i686",
"6Client:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Client:kernel-devel-0:2.6.32-358.el6.s390x",
"6Client:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Client:kernel-doc-0:2.6.32-358.el6.noarch",
"6Client:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Client:kernel-headers-0:2.6.32-358.el6.i686",
"6Client:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Client:kernel-headers-0:2.6.32-358.el6.s390x",
"6Client:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Client:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Client:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Client:perf-0:2.6.32-358.el6.i686",
"6Client:perf-0:2.6.32-358.el6.ppc64",
"6Client:perf-0:2.6.32-358.el6.s390x",
"6Client:perf-0:2.6.32-358.el6.x86_64",
"6Client:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Client:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client:python-perf-0:2.6.32-358.el6.i686",
"6Client:python-perf-0:2.6.32-358.el6.ppc64",
"6Client:python-perf-0:2.6.32-358.el6.s390x",
"6Client:python-perf-0:2.6.32-358.el6.x86_64",
"6Client:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Client:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.src",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debug-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debug-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-devel-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-devel-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-doc-0:2.6.32-358.el6.noarch",
"6ComputeNode-optional:kernel-firmware-0:2.6.32-358.el6.noarch",
"6ComputeNode-optional:kernel-headers-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-headers-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-headers-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-headers-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-kdump-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:perf-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:perf-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:python-perf-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:python-perf-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:python-perf-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:python-perf-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-0:2.6.32-358.el6.src",
"6ComputeNode:kernel-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debug-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debug-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-devel-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-devel-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-devel-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-doc-0:2.6.32-358.el6.noarch",
"6ComputeNode:kernel-firmware-0:2.6.32-358.el6.noarch",
"6ComputeNode:kernel-headers-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-headers-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-headers-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-headers-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-kdump-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode:perf-0:2.6.32-358.el6.i686",
"6ComputeNode:perf-0:2.6.32-358.el6.ppc64",
"6ComputeNode:perf-0:2.6.32-358.el6.s390x",
"6ComputeNode:perf-0:2.6.32-358.el6.x86_64",
"6ComputeNode:perf-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode:python-perf-0:2.6.32-358.el6.i686",
"6ComputeNode:python-perf-0:2.6.32-358.el6.ppc64",
"6ComputeNode:python-perf-0:2.6.32-358.el6.s390x",
"6ComputeNode:python-perf-0:2.6.32-358.el6.x86_64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-0:2.6.32-358.el6.src",
"6Server-optional:kernel-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-devel-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-devel-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-doc-0:2.6.32-358.el6.noarch",
"6Server-optional:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Server-optional:kernel-headers-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-headers-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Server-optional:perf-0:2.6.32-358.el6.i686",
"6Server-optional:perf-0:2.6.32-358.el6.ppc64",
"6Server-optional:perf-0:2.6.32-358.el6.s390x",
"6Server-optional:perf-0:2.6.32-358.el6.x86_64",
"6Server-optional:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Server-optional:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server-optional:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server-optional:python-perf-0:2.6.32-358.el6.i686",
"6Server-optional:python-perf-0:2.6.32-358.el6.ppc64",
"6Server-optional:python-perf-0:2.6.32-358.el6.s390x",
"6Server-optional:python-perf-0:2.6.32-358.el6.x86_64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Server-optional:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server:kernel-0:2.6.32-358.el6.i686",
"6Server:kernel-0:2.6.32-358.el6.ppc64",
"6Server:kernel-0:2.6.32-358.el6.s390x",
"6Server:kernel-0:2.6.32-358.el6.src",
"6Server:kernel-0:2.6.32-358.el6.x86_64",
"6Server:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-358.el6.i686",
"6Server:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-358.el6.s390x",
"6Server:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Server:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Server:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Server:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Server:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Server:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Server:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Server:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Server:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Server:kernel-devel-0:2.6.32-358.el6.i686",
"6Server:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Server:kernel-devel-0:2.6.32-358.el6.s390x",
"6Server:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Server:kernel-doc-0:2.6.32-358.el6.noarch",
"6Server:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Server:kernel-headers-0:2.6.32-358.el6.i686",
"6Server:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Server:kernel-headers-0:2.6.32-358.el6.s390x",
"6Server:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Server:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Server:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Server:perf-0:2.6.32-358.el6.i686",
"6Server:perf-0:2.6.32-358.el6.ppc64",
"6Server:perf-0:2.6.32-358.el6.s390x",
"6Server:perf-0:2.6.32-358.el6.x86_64",
"6Server:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Server:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server:python-perf-0:2.6.32-358.el6.i686",
"6Server:python-perf-0:2.6.32-358.el6.ppc64",
"6Server:python-perf-0:2.6.32-358.el6.s390x",
"6Server:python-perf-0:2.6.32-358.el6.x86_64",
"6Server:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Server:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-0:2.6.32-358.el6.src",
"6Workstation-optional:kernel-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-devel-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-devel-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-doc-0:2.6.32-358.el6.noarch",
"6Workstation-optional:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Workstation-optional:kernel-headers-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-headers-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-358.el6.i686",
"6Workstation-optional:perf-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:perf-0:2.6.32-358.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation-optional:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:python-perf-0:2.6.32-358.el6.i686",
"6Workstation-optional:python-perf-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:python-perf-0:2.6.32-358.el6.s390x",
"6Workstation-optional:python-perf-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-0:2.6.32-358.el6.i686",
"6Workstation:kernel-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-0:2.6.32-358.el6.src",
"6Workstation:kernel-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-devel-0:2.6.32-358.el6.i686",
"6Workstation:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-devel-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-doc-0:2.6.32-358.el6.noarch",
"6Workstation:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Workstation:kernel-headers-0:2.6.32-358.el6.i686",
"6Workstation:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-headers-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Workstation:perf-0:2.6.32-358.el6.i686",
"6Workstation:perf-0:2.6.32-358.el6.ppc64",
"6Workstation:perf-0:2.6.32-358.el6.s390x",
"6Workstation:perf-0:2.6.32-358.el6.x86_64",
"6Workstation:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation:python-perf-0:2.6.32-358.el6.i686",
"6Workstation:python-perf-0:2.6.32-358.el6.ppc64",
"6Workstation:python-perf-0:2.6.32-358.el6.s390x",
"6Workstation:python-perf-0:2.6.32-358.el6.x86_64",
"6Workstation:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:python-perf-debuginfo-0:2.6.32-358.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2013:0496"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 4.7,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"products": [
"6Client-optional:kernel-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-0:2.6.32-358.el6.src",
"6Client-optional:kernel-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-devel-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-devel-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-doc-0:2.6.32-358.el6.noarch",
"6Client-optional:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Client-optional:kernel-headers-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-headers-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Client-optional:perf-0:2.6.32-358.el6.i686",
"6Client-optional:perf-0:2.6.32-358.el6.ppc64",
"6Client-optional:perf-0:2.6.32-358.el6.s390x",
"6Client-optional:perf-0:2.6.32-358.el6.x86_64",
"6Client-optional:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Client-optional:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client-optional:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client-optional:python-perf-0:2.6.32-358.el6.i686",
"6Client-optional:python-perf-0:2.6.32-358.el6.ppc64",
"6Client-optional:python-perf-0:2.6.32-358.el6.s390x",
"6Client-optional:python-perf-0:2.6.32-358.el6.x86_64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Client-optional:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client:kernel-0:2.6.32-358.el6.i686",
"6Client:kernel-0:2.6.32-358.el6.ppc64",
"6Client:kernel-0:2.6.32-358.el6.s390x",
"6Client:kernel-0:2.6.32-358.el6.src",
"6Client:kernel-0:2.6.32-358.el6.x86_64",
"6Client:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-358.el6.i686",
"6Client:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-358.el6.s390x",
"6Client:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Client:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Client:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Client:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Client:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Client:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Client:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Client:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Client:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Client:kernel-devel-0:2.6.32-358.el6.i686",
"6Client:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Client:kernel-devel-0:2.6.32-358.el6.s390x",
"6Client:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Client:kernel-doc-0:2.6.32-358.el6.noarch",
"6Client:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Client:kernel-headers-0:2.6.32-358.el6.i686",
"6Client:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Client:kernel-headers-0:2.6.32-358.el6.s390x",
"6Client:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Client:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Client:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Client:perf-0:2.6.32-358.el6.i686",
"6Client:perf-0:2.6.32-358.el6.ppc64",
"6Client:perf-0:2.6.32-358.el6.s390x",
"6Client:perf-0:2.6.32-358.el6.x86_64",
"6Client:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Client:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client:python-perf-0:2.6.32-358.el6.i686",
"6Client:python-perf-0:2.6.32-358.el6.ppc64",
"6Client:python-perf-0:2.6.32-358.el6.s390x",
"6Client:python-perf-0:2.6.32-358.el6.x86_64",
"6Client:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Client:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.src",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debug-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debug-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-devel-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-devel-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-doc-0:2.6.32-358.el6.noarch",
"6ComputeNode-optional:kernel-firmware-0:2.6.32-358.el6.noarch",
"6ComputeNode-optional:kernel-headers-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-headers-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-headers-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-headers-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-kdump-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:perf-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:perf-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:python-perf-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:python-perf-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:python-perf-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:python-perf-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-0:2.6.32-358.el6.src",
"6ComputeNode:kernel-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debug-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debug-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-devel-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-devel-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-devel-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-doc-0:2.6.32-358.el6.noarch",
"6ComputeNode:kernel-firmware-0:2.6.32-358.el6.noarch",
"6ComputeNode:kernel-headers-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-headers-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-headers-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-headers-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-kdump-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode:perf-0:2.6.32-358.el6.i686",
"6ComputeNode:perf-0:2.6.32-358.el6.ppc64",
"6ComputeNode:perf-0:2.6.32-358.el6.s390x",
"6ComputeNode:perf-0:2.6.32-358.el6.x86_64",
"6ComputeNode:perf-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode:python-perf-0:2.6.32-358.el6.i686",
"6ComputeNode:python-perf-0:2.6.32-358.el6.ppc64",
"6ComputeNode:python-perf-0:2.6.32-358.el6.s390x",
"6ComputeNode:python-perf-0:2.6.32-358.el6.x86_64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-0:2.6.32-358.el6.src",
"6Server-optional:kernel-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-devel-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-devel-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-doc-0:2.6.32-358.el6.noarch",
"6Server-optional:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Server-optional:kernel-headers-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-headers-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Server-optional:perf-0:2.6.32-358.el6.i686",
"6Server-optional:perf-0:2.6.32-358.el6.ppc64",
"6Server-optional:perf-0:2.6.32-358.el6.s390x",
"6Server-optional:perf-0:2.6.32-358.el6.x86_64",
"6Server-optional:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Server-optional:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server-optional:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server-optional:python-perf-0:2.6.32-358.el6.i686",
"6Server-optional:python-perf-0:2.6.32-358.el6.ppc64",
"6Server-optional:python-perf-0:2.6.32-358.el6.s390x",
"6Server-optional:python-perf-0:2.6.32-358.el6.x86_64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Server-optional:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server:kernel-0:2.6.32-358.el6.i686",
"6Server:kernel-0:2.6.32-358.el6.ppc64",
"6Server:kernel-0:2.6.32-358.el6.s390x",
"6Server:kernel-0:2.6.32-358.el6.src",
"6Server:kernel-0:2.6.32-358.el6.x86_64",
"6Server:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-358.el6.i686",
"6Server:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-358.el6.s390x",
"6Server:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Server:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Server:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Server:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Server:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Server:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Server:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Server:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Server:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Server:kernel-devel-0:2.6.32-358.el6.i686",
"6Server:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Server:kernel-devel-0:2.6.32-358.el6.s390x",
"6Server:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Server:kernel-doc-0:2.6.32-358.el6.noarch",
"6Server:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Server:kernel-headers-0:2.6.32-358.el6.i686",
"6Server:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Server:kernel-headers-0:2.6.32-358.el6.s390x",
"6Server:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Server:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Server:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Server:perf-0:2.6.32-358.el6.i686",
"6Server:perf-0:2.6.32-358.el6.ppc64",
"6Server:perf-0:2.6.32-358.el6.s390x",
"6Server:perf-0:2.6.32-358.el6.x86_64",
"6Server:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Server:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server:python-perf-0:2.6.32-358.el6.i686",
"6Server:python-perf-0:2.6.32-358.el6.ppc64",
"6Server:python-perf-0:2.6.32-358.el6.s390x",
"6Server:python-perf-0:2.6.32-358.el6.x86_64",
"6Server:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Server:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-0:2.6.32-358.el6.src",
"6Workstation-optional:kernel-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-devel-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-devel-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-doc-0:2.6.32-358.el6.noarch",
"6Workstation-optional:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Workstation-optional:kernel-headers-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-headers-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-358.el6.i686",
"6Workstation-optional:perf-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:perf-0:2.6.32-358.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation-optional:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:python-perf-0:2.6.32-358.el6.i686",
"6Workstation-optional:python-perf-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:python-perf-0:2.6.32-358.el6.s390x",
"6Workstation-optional:python-perf-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-0:2.6.32-358.el6.i686",
"6Workstation:kernel-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-0:2.6.32-358.el6.src",
"6Workstation:kernel-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-devel-0:2.6.32-358.el6.i686",
"6Workstation:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-devel-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-doc-0:2.6.32-358.el6.noarch",
"6Workstation:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Workstation:kernel-headers-0:2.6.32-358.el6.i686",
"6Workstation:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-headers-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Workstation:perf-0:2.6.32-358.el6.i686",
"6Workstation:perf-0:2.6.32-358.el6.ppc64",
"6Workstation:perf-0:2.6.32-358.el6.s390x",
"6Workstation:perf-0:2.6.32-358.el6.x86_64",
"6Workstation:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation:python-perf-0:2.6.32-358.el6.i686",
"6Workstation:python-perf-0:2.6.32-358.el6.ppc64",
"6Workstation:python-perf-0:2.6.32-358.el6.s390x",
"6Workstation:python-perf-0:2.6.32-358.el6.x86_64",
"6Workstation:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:python-perf-debuginfo-0:2.6.32-358.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: mm: thp: pmd_present and PROT_NONE local DoS"
},
{
"cve": "CVE-2013-0310",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2013-02-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "912900"
}
],
"notes": [
{
"category": "description",
"text": "The cipso_v4_validate function in net/ipv4/cipso_ipv4.c in the Linux kernel before 3.4.8 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via an IPOPT_CIPSO IP_OPTIONS setsockopt system call.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net: CIPSO_V4_TAG_LOCAL tag NULL pointer dereference",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did affect the version of Linux kernel as shipped with Red Hat Enterprise Linux 6.\n\nThis issue did not affect the version of Linux kernel as shipped with Red Hat Enterprise Linux 5 and Red Hat Enterprise MRG 2.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-optional:kernel-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-0:2.6.32-358.el6.src",
"6Client-optional:kernel-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-devel-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-devel-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-doc-0:2.6.32-358.el6.noarch",
"6Client-optional:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Client-optional:kernel-headers-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-headers-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Client-optional:perf-0:2.6.32-358.el6.i686",
"6Client-optional:perf-0:2.6.32-358.el6.ppc64",
"6Client-optional:perf-0:2.6.32-358.el6.s390x",
"6Client-optional:perf-0:2.6.32-358.el6.x86_64",
"6Client-optional:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Client-optional:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client-optional:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client-optional:python-perf-0:2.6.32-358.el6.i686",
"6Client-optional:python-perf-0:2.6.32-358.el6.ppc64",
"6Client-optional:python-perf-0:2.6.32-358.el6.s390x",
"6Client-optional:python-perf-0:2.6.32-358.el6.x86_64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Client-optional:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client:kernel-0:2.6.32-358.el6.i686",
"6Client:kernel-0:2.6.32-358.el6.ppc64",
"6Client:kernel-0:2.6.32-358.el6.s390x",
"6Client:kernel-0:2.6.32-358.el6.src",
"6Client:kernel-0:2.6.32-358.el6.x86_64",
"6Client:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-358.el6.i686",
"6Client:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-358.el6.s390x",
"6Client:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Client:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Client:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Client:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Client:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Client:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Client:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Client:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Client:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Client:kernel-devel-0:2.6.32-358.el6.i686",
"6Client:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Client:kernel-devel-0:2.6.32-358.el6.s390x",
"6Client:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Client:kernel-doc-0:2.6.32-358.el6.noarch",
"6Client:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Client:kernel-headers-0:2.6.32-358.el6.i686",
"6Client:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Client:kernel-headers-0:2.6.32-358.el6.s390x",
"6Client:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Client:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Client:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Client:perf-0:2.6.32-358.el6.i686",
"6Client:perf-0:2.6.32-358.el6.ppc64",
"6Client:perf-0:2.6.32-358.el6.s390x",
"6Client:perf-0:2.6.32-358.el6.x86_64",
"6Client:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Client:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client:python-perf-0:2.6.32-358.el6.i686",
"6Client:python-perf-0:2.6.32-358.el6.ppc64",
"6Client:python-perf-0:2.6.32-358.el6.s390x",
"6Client:python-perf-0:2.6.32-358.el6.x86_64",
"6Client:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Client:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.src",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debug-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debug-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-devel-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-devel-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-doc-0:2.6.32-358.el6.noarch",
"6ComputeNode-optional:kernel-firmware-0:2.6.32-358.el6.noarch",
"6ComputeNode-optional:kernel-headers-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-headers-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-headers-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-headers-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-kdump-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:perf-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:perf-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:python-perf-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:python-perf-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:python-perf-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:python-perf-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-0:2.6.32-358.el6.src",
"6ComputeNode:kernel-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debug-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debug-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-devel-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-devel-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-devel-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-doc-0:2.6.32-358.el6.noarch",
"6ComputeNode:kernel-firmware-0:2.6.32-358.el6.noarch",
"6ComputeNode:kernel-headers-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-headers-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-headers-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-headers-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-kdump-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode:perf-0:2.6.32-358.el6.i686",
"6ComputeNode:perf-0:2.6.32-358.el6.ppc64",
"6ComputeNode:perf-0:2.6.32-358.el6.s390x",
"6ComputeNode:perf-0:2.6.32-358.el6.x86_64",
"6ComputeNode:perf-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode:python-perf-0:2.6.32-358.el6.i686",
"6ComputeNode:python-perf-0:2.6.32-358.el6.ppc64",
"6ComputeNode:python-perf-0:2.6.32-358.el6.s390x",
"6ComputeNode:python-perf-0:2.6.32-358.el6.x86_64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-0:2.6.32-358.el6.src",
"6Server-optional:kernel-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-devel-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-devel-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-doc-0:2.6.32-358.el6.noarch",
"6Server-optional:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Server-optional:kernel-headers-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-headers-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Server-optional:perf-0:2.6.32-358.el6.i686",
"6Server-optional:perf-0:2.6.32-358.el6.ppc64",
"6Server-optional:perf-0:2.6.32-358.el6.s390x",
"6Server-optional:perf-0:2.6.32-358.el6.x86_64",
"6Server-optional:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Server-optional:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server-optional:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server-optional:python-perf-0:2.6.32-358.el6.i686",
"6Server-optional:python-perf-0:2.6.32-358.el6.ppc64",
"6Server-optional:python-perf-0:2.6.32-358.el6.s390x",
"6Server-optional:python-perf-0:2.6.32-358.el6.x86_64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Server-optional:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server:kernel-0:2.6.32-358.el6.i686",
"6Server:kernel-0:2.6.32-358.el6.ppc64",
"6Server:kernel-0:2.6.32-358.el6.s390x",
"6Server:kernel-0:2.6.32-358.el6.src",
"6Server:kernel-0:2.6.32-358.el6.x86_64",
"6Server:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-358.el6.i686",
"6Server:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-358.el6.s390x",
"6Server:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Server:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Server:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Server:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Server:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Server:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Server:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Server:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Server:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Server:kernel-devel-0:2.6.32-358.el6.i686",
"6Server:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Server:kernel-devel-0:2.6.32-358.el6.s390x",
"6Server:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Server:kernel-doc-0:2.6.32-358.el6.noarch",
"6Server:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Server:kernel-headers-0:2.6.32-358.el6.i686",
"6Server:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Server:kernel-headers-0:2.6.32-358.el6.s390x",
"6Server:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Server:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Server:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Server:perf-0:2.6.32-358.el6.i686",
"6Server:perf-0:2.6.32-358.el6.ppc64",
"6Server:perf-0:2.6.32-358.el6.s390x",
"6Server:perf-0:2.6.32-358.el6.x86_64",
"6Server:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Server:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server:python-perf-0:2.6.32-358.el6.i686",
"6Server:python-perf-0:2.6.32-358.el6.ppc64",
"6Server:python-perf-0:2.6.32-358.el6.s390x",
"6Server:python-perf-0:2.6.32-358.el6.x86_64",
"6Server:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Server:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-0:2.6.32-358.el6.src",
"6Workstation-optional:kernel-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-devel-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-devel-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-doc-0:2.6.32-358.el6.noarch",
"6Workstation-optional:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Workstation-optional:kernel-headers-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-headers-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-358.el6.i686",
"6Workstation-optional:perf-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:perf-0:2.6.32-358.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation-optional:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:python-perf-0:2.6.32-358.el6.i686",
"6Workstation-optional:python-perf-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:python-perf-0:2.6.32-358.el6.s390x",
"6Workstation-optional:python-perf-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-0:2.6.32-358.el6.i686",
"6Workstation:kernel-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-0:2.6.32-358.el6.src",
"6Workstation:kernel-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-devel-0:2.6.32-358.el6.i686",
"6Workstation:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-devel-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-doc-0:2.6.32-358.el6.noarch",
"6Workstation:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Workstation:kernel-headers-0:2.6.32-358.el6.i686",
"6Workstation:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-headers-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Workstation:perf-0:2.6.32-358.el6.i686",
"6Workstation:perf-0:2.6.32-358.el6.ppc64",
"6Workstation:perf-0:2.6.32-358.el6.s390x",
"6Workstation:perf-0:2.6.32-358.el6.x86_64",
"6Workstation:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation:python-perf-0:2.6.32-358.el6.i686",
"6Workstation:python-perf-0:2.6.32-358.el6.ppc64",
"6Workstation:python-perf-0:2.6.32-358.el6.s390x",
"6Workstation:python-perf-0:2.6.32-358.el6.x86_64",
"6Workstation:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:python-perf-debuginfo-0:2.6.32-358.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0310"
},
{
"category": "external",
"summary": "RHBZ#912900",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=912900"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0310",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0310"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0310",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0310"
}
],
"release_date": "2013-02-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-02-20T16:32:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"6Client-optional:kernel-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-0:2.6.32-358.el6.src",
"6Client-optional:kernel-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-devel-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-devel-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-doc-0:2.6.32-358.el6.noarch",
"6Client-optional:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Client-optional:kernel-headers-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-headers-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Client-optional:perf-0:2.6.32-358.el6.i686",
"6Client-optional:perf-0:2.6.32-358.el6.ppc64",
"6Client-optional:perf-0:2.6.32-358.el6.s390x",
"6Client-optional:perf-0:2.6.32-358.el6.x86_64",
"6Client-optional:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Client-optional:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client-optional:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client-optional:python-perf-0:2.6.32-358.el6.i686",
"6Client-optional:python-perf-0:2.6.32-358.el6.ppc64",
"6Client-optional:python-perf-0:2.6.32-358.el6.s390x",
"6Client-optional:python-perf-0:2.6.32-358.el6.x86_64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Client-optional:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client:kernel-0:2.6.32-358.el6.i686",
"6Client:kernel-0:2.6.32-358.el6.ppc64",
"6Client:kernel-0:2.6.32-358.el6.s390x",
"6Client:kernel-0:2.6.32-358.el6.src",
"6Client:kernel-0:2.6.32-358.el6.x86_64",
"6Client:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-358.el6.i686",
"6Client:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-358.el6.s390x",
"6Client:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Client:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Client:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Client:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Client:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Client:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Client:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Client:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Client:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Client:kernel-devel-0:2.6.32-358.el6.i686",
"6Client:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Client:kernel-devel-0:2.6.32-358.el6.s390x",
"6Client:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Client:kernel-doc-0:2.6.32-358.el6.noarch",
"6Client:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Client:kernel-headers-0:2.6.32-358.el6.i686",
"6Client:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Client:kernel-headers-0:2.6.32-358.el6.s390x",
"6Client:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Client:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Client:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Client:perf-0:2.6.32-358.el6.i686",
"6Client:perf-0:2.6.32-358.el6.ppc64",
"6Client:perf-0:2.6.32-358.el6.s390x",
"6Client:perf-0:2.6.32-358.el6.x86_64",
"6Client:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Client:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client:python-perf-0:2.6.32-358.el6.i686",
"6Client:python-perf-0:2.6.32-358.el6.ppc64",
"6Client:python-perf-0:2.6.32-358.el6.s390x",
"6Client:python-perf-0:2.6.32-358.el6.x86_64",
"6Client:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Client:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.src",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debug-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debug-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-devel-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-devel-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-doc-0:2.6.32-358.el6.noarch",
"6ComputeNode-optional:kernel-firmware-0:2.6.32-358.el6.noarch",
"6ComputeNode-optional:kernel-headers-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-headers-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-headers-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-headers-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-kdump-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:perf-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:perf-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:python-perf-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:python-perf-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:python-perf-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:python-perf-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-0:2.6.32-358.el6.src",
"6ComputeNode:kernel-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debug-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debug-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-devel-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-devel-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-devel-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-doc-0:2.6.32-358.el6.noarch",
"6ComputeNode:kernel-firmware-0:2.6.32-358.el6.noarch",
"6ComputeNode:kernel-headers-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-headers-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-headers-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-headers-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-kdump-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode:perf-0:2.6.32-358.el6.i686",
"6ComputeNode:perf-0:2.6.32-358.el6.ppc64",
"6ComputeNode:perf-0:2.6.32-358.el6.s390x",
"6ComputeNode:perf-0:2.6.32-358.el6.x86_64",
"6ComputeNode:perf-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode:python-perf-0:2.6.32-358.el6.i686",
"6ComputeNode:python-perf-0:2.6.32-358.el6.ppc64",
"6ComputeNode:python-perf-0:2.6.32-358.el6.s390x",
"6ComputeNode:python-perf-0:2.6.32-358.el6.x86_64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-0:2.6.32-358.el6.src",
"6Server-optional:kernel-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-devel-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-devel-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-doc-0:2.6.32-358.el6.noarch",
"6Server-optional:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Server-optional:kernel-headers-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-headers-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Server-optional:perf-0:2.6.32-358.el6.i686",
"6Server-optional:perf-0:2.6.32-358.el6.ppc64",
"6Server-optional:perf-0:2.6.32-358.el6.s390x",
"6Server-optional:perf-0:2.6.32-358.el6.x86_64",
"6Server-optional:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Server-optional:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server-optional:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server-optional:python-perf-0:2.6.32-358.el6.i686",
"6Server-optional:python-perf-0:2.6.32-358.el6.ppc64",
"6Server-optional:python-perf-0:2.6.32-358.el6.s390x",
"6Server-optional:python-perf-0:2.6.32-358.el6.x86_64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Server-optional:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server:kernel-0:2.6.32-358.el6.i686",
"6Server:kernel-0:2.6.32-358.el6.ppc64",
"6Server:kernel-0:2.6.32-358.el6.s390x",
"6Server:kernel-0:2.6.32-358.el6.src",
"6Server:kernel-0:2.6.32-358.el6.x86_64",
"6Server:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-358.el6.i686",
"6Server:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-358.el6.s390x",
"6Server:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Server:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Server:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Server:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Server:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Server:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Server:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Server:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Server:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Server:kernel-devel-0:2.6.32-358.el6.i686",
"6Server:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Server:kernel-devel-0:2.6.32-358.el6.s390x",
"6Server:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Server:kernel-doc-0:2.6.32-358.el6.noarch",
"6Server:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Server:kernel-headers-0:2.6.32-358.el6.i686",
"6Server:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Server:kernel-headers-0:2.6.32-358.el6.s390x",
"6Server:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Server:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Server:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Server:perf-0:2.6.32-358.el6.i686",
"6Server:perf-0:2.6.32-358.el6.ppc64",
"6Server:perf-0:2.6.32-358.el6.s390x",
"6Server:perf-0:2.6.32-358.el6.x86_64",
"6Server:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Server:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server:python-perf-0:2.6.32-358.el6.i686",
"6Server:python-perf-0:2.6.32-358.el6.ppc64",
"6Server:python-perf-0:2.6.32-358.el6.s390x",
"6Server:python-perf-0:2.6.32-358.el6.x86_64",
"6Server:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Server:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-0:2.6.32-358.el6.src",
"6Workstation-optional:kernel-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-devel-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-devel-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-doc-0:2.6.32-358.el6.noarch",
"6Workstation-optional:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Workstation-optional:kernel-headers-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-headers-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-358.el6.i686",
"6Workstation-optional:perf-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:perf-0:2.6.32-358.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation-optional:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:python-perf-0:2.6.32-358.el6.i686",
"6Workstation-optional:python-perf-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:python-perf-0:2.6.32-358.el6.s390x",
"6Workstation-optional:python-perf-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-0:2.6.32-358.el6.i686",
"6Workstation:kernel-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-0:2.6.32-358.el6.src",
"6Workstation:kernel-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-devel-0:2.6.32-358.el6.i686",
"6Workstation:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-devel-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-doc-0:2.6.32-358.el6.noarch",
"6Workstation:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Workstation:kernel-headers-0:2.6.32-358.el6.i686",
"6Workstation:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-headers-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Workstation:perf-0:2.6.32-358.el6.i686",
"6Workstation:perf-0:2.6.32-358.el6.ppc64",
"6Workstation:perf-0:2.6.32-358.el6.s390x",
"6Workstation:perf-0:2.6.32-358.el6.x86_64",
"6Workstation:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation:python-perf-0:2.6.32-358.el6.i686",
"6Workstation:python-perf-0:2.6.32-358.el6.ppc64",
"6Workstation:python-perf-0:2.6.32-358.el6.s390x",
"6Workstation:python-perf-0:2.6.32-358.el6.x86_64",
"6Workstation:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:python-perf-debuginfo-0:2.6.32-358.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2013:0496"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 4.4,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:M/Au:S/C:N/I:N/A:C",
"version": "2.0"
},
"products": [
"6Client-optional:kernel-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-0:2.6.32-358.el6.src",
"6Client-optional:kernel-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-devel-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-devel-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-doc-0:2.6.32-358.el6.noarch",
"6Client-optional:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Client-optional:kernel-headers-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-headers-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Client-optional:perf-0:2.6.32-358.el6.i686",
"6Client-optional:perf-0:2.6.32-358.el6.ppc64",
"6Client-optional:perf-0:2.6.32-358.el6.s390x",
"6Client-optional:perf-0:2.6.32-358.el6.x86_64",
"6Client-optional:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Client-optional:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client-optional:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client-optional:python-perf-0:2.6.32-358.el6.i686",
"6Client-optional:python-perf-0:2.6.32-358.el6.ppc64",
"6Client-optional:python-perf-0:2.6.32-358.el6.s390x",
"6Client-optional:python-perf-0:2.6.32-358.el6.x86_64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Client-optional:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client:kernel-0:2.6.32-358.el6.i686",
"6Client:kernel-0:2.6.32-358.el6.ppc64",
"6Client:kernel-0:2.6.32-358.el6.s390x",
"6Client:kernel-0:2.6.32-358.el6.src",
"6Client:kernel-0:2.6.32-358.el6.x86_64",
"6Client:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-358.el6.i686",
"6Client:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-358.el6.s390x",
"6Client:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Client:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Client:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Client:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Client:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Client:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Client:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Client:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Client:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Client:kernel-devel-0:2.6.32-358.el6.i686",
"6Client:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Client:kernel-devel-0:2.6.32-358.el6.s390x",
"6Client:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Client:kernel-doc-0:2.6.32-358.el6.noarch",
"6Client:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Client:kernel-headers-0:2.6.32-358.el6.i686",
"6Client:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Client:kernel-headers-0:2.6.32-358.el6.s390x",
"6Client:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Client:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Client:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Client:perf-0:2.6.32-358.el6.i686",
"6Client:perf-0:2.6.32-358.el6.ppc64",
"6Client:perf-0:2.6.32-358.el6.s390x",
"6Client:perf-0:2.6.32-358.el6.x86_64",
"6Client:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Client:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client:python-perf-0:2.6.32-358.el6.i686",
"6Client:python-perf-0:2.6.32-358.el6.ppc64",
"6Client:python-perf-0:2.6.32-358.el6.s390x",
"6Client:python-perf-0:2.6.32-358.el6.x86_64",
"6Client:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Client:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.src",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debug-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debug-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-devel-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-devel-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-doc-0:2.6.32-358.el6.noarch",
"6ComputeNode-optional:kernel-firmware-0:2.6.32-358.el6.noarch",
"6ComputeNode-optional:kernel-headers-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-headers-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-headers-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-headers-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-kdump-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:perf-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:perf-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:python-perf-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:python-perf-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:python-perf-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:python-perf-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-0:2.6.32-358.el6.src",
"6ComputeNode:kernel-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debug-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debug-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-devel-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-devel-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-devel-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-doc-0:2.6.32-358.el6.noarch",
"6ComputeNode:kernel-firmware-0:2.6.32-358.el6.noarch",
"6ComputeNode:kernel-headers-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-headers-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-headers-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-headers-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-kdump-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode:perf-0:2.6.32-358.el6.i686",
"6ComputeNode:perf-0:2.6.32-358.el6.ppc64",
"6ComputeNode:perf-0:2.6.32-358.el6.s390x",
"6ComputeNode:perf-0:2.6.32-358.el6.x86_64",
"6ComputeNode:perf-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode:python-perf-0:2.6.32-358.el6.i686",
"6ComputeNode:python-perf-0:2.6.32-358.el6.ppc64",
"6ComputeNode:python-perf-0:2.6.32-358.el6.s390x",
"6ComputeNode:python-perf-0:2.6.32-358.el6.x86_64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-0:2.6.32-358.el6.src",
"6Server-optional:kernel-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-devel-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-devel-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-doc-0:2.6.32-358.el6.noarch",
"6Server-optional:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Server-optional:kernel-headers-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-headers-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Server-optional:perf-0:2.6.32-358.el6.i686",
"6Server-optional:perf-0:2.6.32-358.el6.ppc64",
"6Server-optional:perf-0:2.6.32-358.el6.s390x",
"6Server-optional:perf-0:2.6.32-358.el6.x86_64",
"6Server-optional:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Server-optional:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server-optional:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server-optional:python-perf-0:2.6.32-358.el6.i686",
"6Server-optional:python-perf-0:2.6.32-358.el6.ppc64",
"6Server-optional:python-perf-0:2.6.32-358.el6.s390x",
"6Server-optional:python-perf-0:2.6.32-358.el6.x86_64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Server-optional:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server:kernel-0:2.6.32-358.el6.i686",
"6Server:kernel-0:2.6.32-358.el6.ppc64",
"6Server:kernel-0:2.6.32-358.el6.s390x",
"6Server:kernel-0:2.6.32-358.el6.src",
"6Server:kernel-0:2.6.32-358.el6.x86_64",
"6Server:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-358.el6.i686",
"6Server:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-358.el6.s390x",
"6Server:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Server:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Server:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Server:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Server:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Server:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Server:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Server:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Server:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Server:kernel-devel-0:2.6.32-358.el6.i686",
"6Server:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Server:kernel-devel-0:2.6.32-358.el6.s390x",
"6Server:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Server:kernel-doc-0:2.6.32-358.el6.noarch",
"6Server:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Server:kernel-headers-0:2.6.32-358.el6.i686",
"6Server:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Server:kernel-headers-0:2.6.32-358.el6.s390x",
"6Server:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Server:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Server:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Server:perf-0:2.6.32-358.el6.i686",
"6Server:perf-0:2.6.32-358.el6.ppc64",
"6Server:perf-0:2.6.32-358.el6.s390x",
"6Server:perf-0:2.6.32-358.el6.x86_64",
"6Server:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Server:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server:python-perf-0:2.6.32-358.el6.i686",
"6Server:python-perf-0:2.6.32-358.el6.ppc64",
"6Server:python-perf-0:2.6.32-358.el6.s390x",
"6Server:python-perf-0:2.6.32-358.el6.x86_64",
"6Server:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Server:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-0:2.6.32-358.el6.src",
"6Workstation-optional:kernel-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-devel-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-devel-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-doc-0:2.6.32-358.el6.noarch",
"6Workstation-optional:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Workstation-optional:kernel-headers-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-headers-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-358.el6.i686",
"6Workstation-optional:perf-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:perf-0:2.6.32-358.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation-optional:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:python-perf-0:2.6.32-358.el6.i686",
"6Workstation-optional:python-perf-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:python-perf-0:2.6.32-358.el6.s390x",
"6Workstation-optional:python-perf-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-0:2.6.32-358.el6.i686",
"6Workstation:kernel-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-0:2.6.32-358.el6.src",
"6Workstation:kernel-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-devel-0:2.6.32-358.el6.i686",
"6Workstation:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-devel-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-doc-0:2.6.32-358.el6.noarch",
"6Workstation:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Workstation:kernel-headers-0:2.6.32-358.el6.i686",
"6Workstation:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-headers-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Workstation:perf-0:2.6.32-358.el6.i686",
"6Workstation:perf-0:2.6.32-358.el6.ppc64",
"6Workstation:perf-0:2.6.32-358.el6.s390x",
"6Workstation:perf-0:2.6.32-358.el6.x86_64",
"6Workstation:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation:python-perf-0:2.6.32-358.el6.i686",
"6Workstation:python-perf-0:2.6.32-358.el6.ppc64",
"6Workstation:python-perf-0:2.6.32-358.el6.s390x",
"6Workstation:python-perf-0:2.6.32-358.el6.x86_64",
"6Workstation:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:python-perf-debuginfo-0:2.6.32-358.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net: CIPSO_V4_TAG_LOCAL tag NULL pointer dereference"
},
{
"cve": "CVE-2013-0311",
"discovery_date": "2013-02-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "912905"
}
],
"notes": [
{
"category": "description",
"text": "The translate_desc function in drivers/vhost/vhost.c in the Linux kernel before 3.7 does not properly handle cross-region descriptors, which allows guest OS users to obtain host OS privileges by leveraging KVM guest OS privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: vhost: fix length for cross region descriptor",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did affect the version of Linux kernel as shipped with Red Hat Enterprise Linux 6.\n\nThis issue did not affect the version of Linux kernel as shipped with Red Hat Enterprise Linux 5 and Red Hat Enterprise MRG 2.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-optional:kernel-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-0:2.6.32-358.el6.src",
"6Client-optional:kernel-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-devel-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-devel-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-doc-0:2.6.32-358.el6.noarch",
"6Client-optional:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Client-optional:kernel-headers-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-headers-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Client-optional:perf-0:2.6.32-358.el6.i686",
"6Client-optional:perf-0:2.6.32-358.el6.ppc64",
"6Client-optional:perf-0:2.6.32-358.el6.s390x",
"6Client-optional:perf-0:2.6.32-358.el6.x86_64",
"6Client-optional:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Client-optional:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client-optional:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client-optional:python-perf-0:2.6.32-358.el6.i686",
"6Client-optional:python-perf-0:2.6.32-358.el6.ppc64",
"6Client-optional:python-perf-0:2.6.32-358.el6.s390x",
"6Client-optional:python-perf-0:2.6.32-358.el6.x86_64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Client-optional:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client:kernel-0:2.6.32-358.el6.i686",
"6Client:kernel-0:2.6.32-358.el6.ppc64",
"6Client:kernel-0:2.6.32-358.el6.s390x",
"6Client:kernel-0:2.6.32-358.el6.src",
"6Client:kernel-0:2.6.32-358.el6.x86_64",
"6Client:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-358.el6.i686",
"6Client:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-358.el6.s390x",
"6Client:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Client:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Client:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Client:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Client:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Client:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Client:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Client:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Client:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Client:kernel-devel-0:2.6.32-358.el6.i686",
"6Client:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Client:kernel-devel-0:2.6.32-358.el6.s390x",
"6Client:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Client:kernel-doc-0:2.6.32-358.el6.noarch",
"6Client:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Client:kernel-headers-0:2.6.32-358.el6.i686",
"6Client:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Client:kernel-headers-0:2.6.32-358.el6.s390x",
"6Client:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Client:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Client:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Client:perf-0:2.6.32-358.el6.i686",
"6Client:perf-0:2.6.32-358.el6.ppc64",
"6Client:perf-0:2.6.32-358.el6.s390x",
"6Client:perf-0:2.6.32-358.el6.x86_64",
"6Client:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Client:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client:python-perf-0:2.6.32-358.el6.i686",
"6Client:python-perf-0:2.6.32-358.el6.ppc64",
"6Client:python-perf-0:2.6.32-358.el6.s390x",
"6Client:python-perf-0:2.6.32-358.el6.x86_64",
"6Client:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Client:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.src",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debug-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debug-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-devel-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-devel-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-doc-0:2.6.32-358.el6.noarch",
"6ComputeNode-optional:kernel-firmware-0:2.6.32-358.el6.noarch",
"6ComputeNode-optional:kernel-headers-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-headers-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-headers-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-headers-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-kdump-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:perf-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:perf-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:python-perf-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:python-perf-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:python-perf-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:python-perf-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-0:2.6.32-358.el6.src",
"6ComputeNode:kernel-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debug-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debug-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-devel-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-devel-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-devel-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-doc-0:2.6.32-358.el6.noarch",
"6ComputeNode:kernel-firmware-0:2.6.32-358.el6.noarch",
"6ComputeNode:kernel-headers-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-headers-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-headers-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-headers-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-kdump-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode:perf-0:2.6.32-358.el6.i686",
"6ComputeNode:perf-0:2.6.32-358.el6.ppc64",
"6ComputeNode:perf-0:2.6.32-358.el6.s390x",
"6ComputeNode:perf-0:2.6.32-358.el6.x86_64",
"6ComputeNode:perf-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode:python-perf-0:2.6.32-358.el6.i686",
"6ComputeNode:python-perf-0:2.6.32-358.el6.ppc64",
"6ComputeNode:python-perf-0:2.6.32-358.el6.s390x",
"6ComputeNode:python-perf-0:2.6.32-358.el6.x86_64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-0:2.6.32-358.el6.src",
"6Server-optional:kernel-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-devel-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-devel-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-doc-0:2.6.32-358.el6.noarch",
"6Server-optional:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Server-optional:kernel-headers-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-headers-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Server-optional:perf-0:2.6.32-358.el6.i686",
"6Server-optional:perf-0:2.6.32-358.el6.ppc64",
"6Server-optional:perf-0:2.6.32-358.el6.s390x",
"6Server-optional:perf-0:2.6.32-358.el6.x86_64",
"6Server-optional:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Server-optional:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server-optional:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server-optional:python-perf-0:2.6.32-358.el6.i686",
"6Server-optional:python-perf-0:2.6.32-358.el6.ppc64",
"6Server-optional:python-perf-0:2.6.32-358.el6.s390x",
"6Server-optional:python-perf-0:2.6.32-358.el6.x86_64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Server-optional:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server:kernel-0:2.6.32-358.el6.i686",
"6Server:kernel-0:2.6.32-358.el6.ppc64",
"6Server:kernel-0:2.6.32-358.el6.s390x",
"6Server:kernel-0:2.6.32-358.el6.src",
"6Server:kernel-0:2.6.32-358.el6.x86_64",
"6Server:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-358.el6.i686",
"6Server:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-358.el6.s390x",
"6Server:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Server:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Server:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Server:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Server:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Server:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Server:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Server:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Server:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Server:kernel-devel-0:2.6.32-358.el6.i686",
"6Server:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Server:kernel-devel-0:2.6.32-358.el6.s390x",
"6Server:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Server:kernel-doc-0:2.6.32-358.el6.noarch",
"6Server:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Server:kernel-headers-0:2.6.32-358.el6.i686",
"6Server:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Server:kernel-headers-0:2.6.32-358.el6.s390x",
"6Server:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Server:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Server:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Server:perf-0:2.6.32-358.el6.i686",
"6Server:perf-0:2.6.32-358.el6.ppc64",
"6Server:perf-0:2.6.32-358.el6.s390x",
"6Server:perf-0:2.6.32-358.el6.x86_64",
"6Server:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Server:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server:python-perf-0:2.6.32-358.el6.i686",
"6Server:python-perf-0:2.6.32-358.el6.ppc64",
"6Server:python-perf-0:2.6.32-358.el6.s390x",
"6Server:python-perf-0:2.6.32-358.el6.x86_64",
"6Server:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Server:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-0:2.6.32-358.el6.src",
"6Workstation-optional:kernel-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-devel-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-devel-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-doc-0:2.6.32-358.el6.noarch",
"6Workstation-optional:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Workstation-optional:kernel-headers-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-headers-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-358.el6.i686",
"6Workstation-optional:perf-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:perf-0:2.6.32-358.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation-optional:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:python-perf-0:2.6.32-358.el6.i686",
"6Workstation-optional:python-perf-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:python-perf-0:2.6.32-358.el6.s390x",
"6Workstation-optional:python-perf-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-0:2.6.32-358.el6.i686",
"6Workstation:kernel-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-0:2.6.32-358.el6.src",
"6Workstation:kernel-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-devel-0:2.6.32-358.el6.i686",
"6Workstation:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-devel-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-doc-0:2.6.32-358.el6.noarch",
"6Workstation:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Workstation:kernel-headers-0:2.6.32-358.el6.i686",
"6Workstation:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-headers-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Workstation:perf-0:2.6.32-358.el6.i686",
"6Workstation:perf-0:2.6.32-358.el6.ppc64",
"6Workstation:perf-0:2.6.32-358.el6.s390x",
"6Workstation:perf-0:2.6.32-358.el6.x86_64",
"6Workstation:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation:python-perf-0:2.6.32-358.el6.i686",
"6Workstation:python-perf-0:2.6.32-358.el6.ppc64",
"6Workstation:python-perf-0:2.6.32-358.el6.s390x",
"6Workstation:python-perf-0:2.6.32-358.el6.x86_64",
"6Workstation:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:python-perf-debuginfo-0:2.6.32-358.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0311"
},
{
"category": "external",
"summary": "RHBZ#912905",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=912905"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0311",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0311"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0311",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0311"
}
],
"release_date": "2013-02-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-02-20T16:32:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"6Client-optional:kernel-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-0:2.6.32-358.el6.src",
"6Client-optional:kernel-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-devel-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-devel-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-doc-0:2.6.32-358.el6.noarch",
"6Client-optional:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Client-optional:kernel-headers-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-headers-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Client-optional:perf-0:2.6.32-358.el6.i686",
"6Client-optional:perf-0:2.6.32-358.el6.ppc64",
"6Client-optional:perf-0:2.6.32-358.el6.s390x",
"6Client-optional:perf-0:2.6.32-358.el6.x86_64",
"6Client-optional:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Client-optional:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client-optional:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client-optional:python-perf-0:2.6.32-358.el6.i686",
"6Client-optional:python-perf-0:2.6.32-358.el6.ppc64",
"6Client-optional:python-perf-0:2.6.32-358.el6.s390x",
"6Client-optional:python-perf-0:2.6.32-358.el6.x86_64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Client-optional:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client:kernel-0:2.6.32-358.el6.i686",
"6Client:kernel-0:2.6.32-358.el6.ppc64",
"6Client:kernel-0:2.6.32-358.el6.s390x",
"6Client:kernel-0:2.6.32-358.el6.src",
"6Client:kernel-0:2.6.32-358.el6.x86_64",
"6Client:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-358.el6.i686",
"6Client:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-358.el6.s390x",
"6Client:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Client:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Client:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Client:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Client:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Client:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Client:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Client:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Client:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Client:kernel-devel-0:2.6.32-358.el6.i686",
"6Client:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Client:kernel-devel-0:2.6.32-358.el6.s390x",
"6Client:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Client:kernel-doc-0:2.6.32-358.el6.noarch",
"6Client:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Client:kernel-headers-0:2.6.32-358.el6.i686",
"6Client:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Client:kernel-headers-0:2.6.32-358.el6.s390x",
"6Client:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Client:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Client:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Client:perf-0:2.6.32-358.el6.i686",
"6Client:perf-0:2.6.32-358.el6.ppc64",
"6Client:perf-0:2.6.32-358.el6.s390x",
"6Client:perf-0:2.6.32-358.el6.x86_64",
"6Client:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Client:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client:python-perf-0:2.6.32-358.el6.i686",
"6Client:python-perf-0:2.6.32-358.el6.ppc64",
"6Client:python-perf-0:2.6.32-358.el6.s390x",
"6Client:python-perf-0:2.6.32-358.el6.x86_64",
"6Client:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Client:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.src",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debug-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debug-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-devel-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-devel-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-doc-0:2.6.32-358.el6.noarch",
"6ComputeNode-optional:kernel-firmware-0:2.6.32-358.el6.noarch",
"6ComputeNode-optional:kernel-headers-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-headers-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-headers-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-headers-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-kdump-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:perf-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:perf-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:python-perf-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:python-perf-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:python-perf-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:python-perf-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-0:2.6.32-358.el6.src",
"6ComputeNode:kernel-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debug-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debug-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-devel-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-devel-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-devel-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-doc-0:2.6.32-358.el6.noarch",
"6ComputeNode:kernel-firmware-0:2.6.32-358.el6.noarch",
"6ComputeNode:kernel-headers-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-headers-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-headers-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-headers-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-kdump-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode:perf-0:2.6.32-358.el6.i686",
"6ComputeNode:perf-0:2.6.32-358.el6.ppc64",
"6ComputeNode:perf-0:2.6.32-358.el6.s390x",
"6ComputeNode:perf-0:2.6.32-358.el6.x86_64",
"6ComputeNode:perf-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode:python-perf-0:2.6.32-358.el6.i686",
"6ComputeNode:python-perf-0:2.6.32-358.el6.ppc64",
"6ComputeNode:python-perf-0:2.6.32-358.el6.s390x",
"6ComputeNode:python-perf-0:2.6.32-358.el6.x86_64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-0:2.6.32-358.el6.src",
"6Server-optional:kernel-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-devel-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-devel-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-doc-0:2.6.32-358.el6.noarch",
"6Server-optional:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Server-optional:kernel-headers-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-headers-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Server-optional:perf-0:2.6.32-358.el6.i686",
"6Server-optional:perf-0:2.6.32-358.el6.ppc64",
"6Server-optional:perf-0:2.6.32-358.el6.s390x",
"6Server-optional:perf-0:2.6.32-358.el6.x86_64",
"6Server-optional:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Server-optional:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server-optional:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server-optional:python-perf-0:2.6.32-358.el6.i686",
"6Server-optional:python-perf-0:2.6.32-358.el6.ppc64",
"6Server-optional:python-perf-0:2.6.32-358.el6.s390x",
"6Server-optional:python-perf-0:2.6.32-358.el6.x86_64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Server-optional:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server:kernel-0:2.6.32-358.el6.i686",
"6Server:kernel-0:2.6.32-358.el6.ppc64",
"6Server:kernel-0:2.6.32-358.el6.s390x",
"6Server:kernel-0:2.6.32-358.el6.src",
"6Server:kernel-0:2.6.32-358.el6.x86_64",
"6Server:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-358.el6.i686",
"6Server:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-358.el6.s390x",
"6Server:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Server:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Server:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Server:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Server:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Server:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Server:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Server:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Server:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Server:kernel-devel-0:2.6.32-358.el6.i686",
"6Server:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Server:kernel-devel-0:2.6.32-358.el6.s390x",
"6Server:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Server:kernel-doc-0:2.6.32-358.el6.noarch",
"6Server:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Server:kernel-headers-0:2.6.32-358.el6.i686",
"6Server:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Server:kernel-headers-0:2.6.32-358.el6.s390x",
"6Server:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Server:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Server:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Server:perf-0:2.6.32-358.el6.i686",
"6Server:perf-0:2.6.32-358.el6.ppc64",
"6Server:perf-0:2.6.32-358.el6.s390x",
"6Server:perf-0:2.6.32-358.el6.x86_64",
"6Server:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Server:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server:python-perf-0:2.6.32-358.el6.i686",
"6Server:python-perf-0:2.6.32-358.el6.ppc64",
"6Server:python-perf-0:2.6.32-358.el6.s390x",
"6Server:python-perf-0:2.6.32-358.el6.x86_64",
"6Server:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Server:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-0:2.6.32-358.el6.src",
"6Workstation-optional:kernel-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-devel-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-devel-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-doc-0:2.6.32-358.el6.noarch",
"6Workstation-optional:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Workstation-optional:kernel-headers-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-headers-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-358.el6.i686",
"6Workstation-optional:perf-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:perf-0:2.6.32-358.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation-optional:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:python-perf-0:2.6.32-358.el6.i686",
"6Workstation-optional:python-perf-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:python-perf-0:2.6.32-358.el6.s390x",
"6Workstation-optional:python-perf-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-0:2.6.32-358.el6.i686",
"6Workstation:kernel-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-0:2.6.32-358.el6.src",
"6Workstation:kernel-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-devel-0:2.6.32-358.el6.i686",
"6Workstation:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-devel-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-doc-0:2.6.32-358.el6.noarch",
"6Workstation:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Workstation:kernel-headers-0:2.6.32-358.el6.i686",
"6Workstation:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-headers-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Workstation:perf-0:2.6.32-358.el6.i686",
"6Workstation:perf-0:2.6.32-358.el6.ppc64",
"6Workstation:perf-0:2.6.32-358.el6.s390x",
"6Workstation:perf-0:2.6.32-358.el6.x86_64",
"6Workstation:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation:python-perf-0:2.6.32-358.el6.i686",
"6Workstation:python-perf-0:2.6.32-358.el6.ppc64",
"6Workstation:python-perf-0:2.6.32-358.el6.s390x",
"6Workstation:python-perf-0:2.6.32-358.el6.x86_64",
"6Workstation:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:python-perf-debuginfo-0:2.6.32-358.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2013:0496"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "ADJACENT_NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.5,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:A/AC:H/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
"products": [
"6Client-optional:kernel-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-0:2.6.32-358.el6.src",
"6Client-optional:kernel-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-devel-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-devel-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-doc-0:2.6.32-358.el6.noarch",
"6Client-optional:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Client-optional:kernel-headers-0:2.6.32-358.el6.i686",
"6Client-optional:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Client-optional:kernel-headers-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Client-optional:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Client-optional:perf-0:2.6.32-358.el6.i686",
"6Client-optional:perf-0:2.6.32-358.el6.ppc64",
"6Client-optional:perf-0:2.6.32-358.el6.s390x",
"6Client-optional:perf-0:2.6.32-358.el6.x86_64",
"6Client-optional:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Client-optional:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client-optional:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client-optional:python-perf-0:2.6.32-358.el6.i686",
"6Client-optional:python-perf-0:2.6.32-358.el6.ppc64",
"6Client-optional:python-perf-0:2.6.32-358.el6.s390x",
"6Client-optional:python-perf-0:2.6.32-358.el6.x86_64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Client-optional:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Client-optional:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client:kernel-0:2.6.32-358.el6.i686",
"6Client:kernel-0:2.6.32-358.el6.ppc64",
"6Client:kernel-0:2.6.32-358.el6.s390x",
"6Client:kernel-0:2.6.32-358.el6.src",
"6Client:kernel-0:2.6.32-358.el6.x86_64",
"6Client:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-358.el6.i686",
"6Client:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-358.el6.s390x",
"6Client:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Client:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Client:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Client:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Client:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Client:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Client:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Client:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Client:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Client:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Client:kernel-devel-0:2.6.32-358.el6.i686",
"6Client:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Client:kernel-devel-0:2.6.32-358.el6.s390x",
"6Client:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Client:kernel-doc-0:2.6.32-358.el6.noarch",
"6Client:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Client:kernel-headers-0:2.6.32-358.el6.i686",
"6Client:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Client:kernel-headers-0:2.6.32-358.el6.s390x",
"6Client:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Client:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Client:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Client:perf-0:2.6.32-358.el6.i686",
"6Client:perf-0:2.6.32-358.el6.ppc64",
"6Client:perf-0:2.6.32-358.el6.s390x",
"6Client:perf-0:2.6.32-358.el6.x86_64",
"6Client:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Client:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Client:python-perf-0:2.6.32-358.el6.i686",
"6Client:python-perf-0:2.6.32-358.el6.ppc64",
"6Client:python-perf-0:2.6.32-358.el6.s390x",
"6Client:python-perf-0:2.6.32-358.el6.x86_64",
"6Client:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Client:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Client:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Client:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.src",
"6ComputeNode-optional:kernel-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debug-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debug-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-devel-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-devel-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-doc-0:2.6.32-358.el6.noarch",
"6ComputeNode-optional:kernel-firmware-0:2.6.32-358.el6.noarch",
"6ComputeNode-optional:kernel-headers-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:kernel-headers-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:kernel-headers-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-headers-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:kernel-kdump-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:perf-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:perf-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:python-perf-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:python-perf-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:python-perf-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:python-perf-0:2.6.32-358.el6.x86_64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-0:2.6.32-358.el6.src",
"6ComputeNode:kernel-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debug-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debug-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-devel-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-devel-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-devel-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-doc-0:2.6.32-358.el6.noarch",
"6ComputeNode:kernel-firmware-0:2.6.32-358.el6.noarch",
"6ComputeNode:kernel-headers-0:2.6.32-358.el6.i686",
"6ComputeNode:kernel-headers-0:2.6.32-358.el6.ppc64",
"6ComputeNode:kernel-headers-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-headers-0:2.6.32-358.el6.x86_64",
"6ComputeNode:kernel-kdump-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6ComputeNode:perf-0:2.6.32-358.el6.i686",
"6ComputeNode:perf-0:2.6.32-358.el6.ppc64",
"6ComputeNode:perf-0:2.6.32-358.el6.s390x",
"6ComputeNode:perf-0:2.6.32-358.el6.x86_64",
"6ComputeNode:perf-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6ComputeNode:python-perf-0:2.6.32-358.el6.i686",
"6ComputeNode:python-perf-0:2.6.32-358.el6.ppc64",
"6ComputeNode:python-perf-0:2.6.32-358.el6.s390x",
"6ComputeNode:python-perf-0:2.6.32-358.el6.x86_64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-0:2.6.32-358.el6.src",
"6Server-optional:kernel-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-devel-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-devel-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-doc-0:2.6.32-358.el6.noarch",
"6Server-optional:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Server-optional:kernel-headers-0:2.6.32-358.el6.i686",
"6Server-optional:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Server-optional:kernel-headers-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Server-optional:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Server-optional:perf-0:2.6.32-358.el6.i686",
"6Server-optional:perf-0:2.6.32-358.el6.ppc64",
"6Server-optional:perf-0:2.6.32-358.el6.s390x",
"6Server-optional:perf-0:2.6.32-358.el6.x86_64",
"6Server-optional:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Server-optional:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server-optional:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server-optional:python-perf-0:2.6.32-358.el6.i686",
"6Server-optional:python-perf-0:2.6.32-358.el6.ppc64",
"6Server-optional:python-perf-0:2.6.32-358.el6.s390x",
"6Server-optional:python-perf-0:2.6.32-358.el6.x86_64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Server-optional:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Server-optional:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server:kernel-0:2.6.32-358.el6.i686",
"6Server:kernel-0:2.6.32-358.el6.ppc64",
"6Server:kernel-0:2.6.32-358.el6.s390x",
"6Server:kernel-0:2.6.32-358.el6.src",
"6Server:kernel-0:2.6.32-358.el6.x86_64",
"6Server:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-358.el6.i686",
"6Server:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-358.el6.s390x",
"6Server:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Server:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Server:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Server:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Server:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Server:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Server:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Server:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Server:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Server:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Server:kernel-devel-0:2.6.32-358.el6.i686",
"6Server:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Server:kernel-devel-0:2.6.32-358.el6.s390x",
"6Server:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Server:kernel-doc-0:2.6.32-358.el6.noarch",
"6Server:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Server:kernel-headers-0:2.6.32-358.el6.i686",
"6Server:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Server:kernel-headers-0:2.6.32-358.el6.s390x",
"6Server:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Server:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Server:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Server:perf-0:2.6.32-358.el6.i686",
"6Server:perf-0:2.6.32-358.el6.ppc64",
"6Server:perf-0:2.6.32-358.el6.s390x",
"6Server:perf-0:2.6.32-358.el6.x86_64",
"6Server:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Server:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Server:python-perf-0:2.6.32-358.el6.i686",
"6Server:python-perf-0:2.6.32-358.el6.ppc64",
"6Server:python-perf-0:2.6.32-358.el6.s390x",
"6Server:python-perf-0:2.6.32-358.el6.x86_64",
"6Server:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Server:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Server:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Server:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-0:2.6.32-358.el6.src",
"6Workstation-optional:kernel-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-devel-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-devel-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-doc-0:2.6.32-358.el6.noarch",
"6Workstation-optional:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Workstation-optional:kernel-headers-0:2.6.32-358.el6.i686",
"6Workstation-optional:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:kernel-headers-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-358.el6.i686",
"6Workstation-optional:perf-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:perf-0:2.6.32-358.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation-optional:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:python-perf-0:2.6.32-358.el6.i686",
"6Workstation-optional:python-perf-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:python-perf-0:2.6.32-358.el6.s390x",
"6Workstation-optional:python-perf-0:2.6.32-358.el6.x86_64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-0:2.6.32-358.el6.i686",
"6Workstation:kernel-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-0:2.6.32-358.el6.src",
"6Workstation:kernel-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-bootwrapper-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debug-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debug-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-debug-devel-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debug-devel-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debug-devel-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debug-devel-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-debuginfo-common-i686-0:2.6.32-358.el6.i686",
"6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-devel-0:2.6.32-358.el6.i686",
"6Workstation:kernel-devel-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-devel-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-devel-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-doc-0:2.6.32-358.el6.noarch",
"6Workstation:kernel-firmware-0:2.6.32-358.el6.noarch",
"6Workstation:kernel-headers-0:2.6.32-358.el6.i686",
"6Workstation:kernel-headers-0:2.6.32-358.el6.ppc64",
"6Workstation:kernel-headers-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-headers-0:2.6.32-358.el6.x86_64",
"6Workstation:kernel-kdump-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-kdump-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:kernel-kdump-devel-0:2.6.32-358.el6.s390x",
"6Workstation:perf-0:2.6.32-358.el6.i686",
"6Workstation:perf-0:2.6.32-358.el6.ppc64",
"6Workstation:perf-0:2.6.32-358.el6.s390x",
"6Workstation:perf-0:2.6.32-358.el6.x86_64",
"6Workstation:perf-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation:perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation:perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:perf-debuginfo-0:2.6.32-358.el6.x86_64",
"6Workstation:python-perf-0:2.6.32-358.el6.i686",
"6Workstation:python-perf-0:2.6.32-358.el6.ppc64",
"6Workstation:python-perf-0:2.6.32-358.el6.s390x",
"6Workstation:python-perf-0:2.6.32-358.el6.x86_64",
"6Workstation:python-perf-debuginfo-0:2.6.32-358.el6.i686",
"6Workstation:python-perf-debuginfo-0:2.6.32-358.el6.ppc64",
"6Workstation:python-perf-debuginfo-0:2.6.32-358.el6.s390x",
"6Workstation:python-perf-debuginfo-0:2.6.32-358.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: vhost: fix length for cross region descriptor"
}
]
}
CERTFR-2026-AVI-0316
Vulnerability from certfr_avis - Published: 2026-03-19 - Updated: 2026-03-19
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | N/A | NodeJS Buildpack versions antérieures à 1.8.82 | ||
| VMware | Tanzu Platform | Tanzu for MySQL sur Tanzu Platform versions antérieures à 10.1.1 | ||
| VMware | N/A | Java Buildpack versions antérieures à 4.90.0 | ||
| VMware | N/A | NGINX Buildpack versions antérieures à 1.2.71 | ||
| VMware | N/A | HWC Buildpack versions antérieures à 3.1.91 | ||
| VMware | Tanzu Platform | Foundation Core for VMware Tanzu Platform versions antérieures à 3.1.9 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "NodeJS Buildpack versions ant\u00e9rieures \u00e0 1.8.82",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu for MySQL sur Tanzu Platform versions ant\u00e9rieures \u00e0 10.1.1",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Java Buildpack versions ant\u00e9rieures \u00e0 4.90.0",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "NGINX Buildpack versions ant\u00e9rieures \u00e0 1.2.71",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "HWC Buildpack versions ant\u00e9rieures \u00e0 3.1.91",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Foundation Core for VMware Tanzu Platform versions ant\u00e9rieures \u00e0 3.1.9",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2026-28422",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28422"
},
{
"name": "CVE-2024-36903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36903"
},
{
"name": "CVE-2024-35875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35875"
},
{
"name": "CVE-2022-50759",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50759"
},
{
"name": "CVE-2026-26007",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26007"
},
{
"name": "CVE-2025-71075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71075"
},
{
"name": "CVE-2024-49912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49912"
},
{
"name": "CVE-2024-36026",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36026"
},
{
"name": "CVE-2026-23198",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23198"
},
{
"name": "CVE-2023-3640",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3640"
},
{
"name": "CVE-2024-27435",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27435"
},
{
"name": "CVE-2025-40273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40273"
},
{
"name": "CVE-2023-53714",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53714"
},
{
"name": "CVE-2024-42122",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42122"
},
{
"name": "CVE-2025-68230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68230"
},
{
"name": "CVE-2026-28420",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28420"
},
{
"name": "CVE-2022-49069",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49069"
},
{
"name": "CVE-2024-57875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57875"
},
{
"name": "CVE-2022-27943",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27943"
},
{
"name": "CVE-2025-40064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40064"
},
{
"name": "CVE-2023-54129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54129"
},
{
"name": "CVE-2025-66865",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66865"
},
{
"name": "CVE-2024-41031",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41031"
},
{
"name": "CVE-2025-39992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39992"
},
{
"name": "CVE-2025-69534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69534"
},
{
"name": "CVE-2025-61730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61730"
},
{
"name": "CVE-2022-49543",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49543"
},
{
"name": "CVE-2026-23202",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23202"
},
{
"name": "CVE-2025-38485",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38485"
},
{
"name": "CVE-2023-53562",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53562"
},
{
"name": "CVE-2025-68324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68324"
},
{
"name": "CVE-2025-22026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22026"
},
{
"name": "CVE-2023-54149",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54149"
},
{
"name": "CVE-2025-71086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71086"
},
{
"name": "CVE-2024-50063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50063"
},
{
"name": "CVE-2023-33875",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33875"
},
{
"name": "CVE-2024-41001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41001"
},
{
"name": "CVE-2024-42155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42155"
},
{
"name": "CVE-2026-23167",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23167"
},
{
"name": "CVE-2025-36353",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36353"
},
{
"name": "CVE-2025-68196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68196"
},
{
"name": "CVE-2024-46770",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46770"
},
{
"name": "CVE-2023-53247",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53247"
},
{
"name": "CVE-2025-38042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38042"
},
{
"name": "CVE-2025-22083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22083"
},
{
"name": "CVE-2023-53829",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53829"
},
{
"name": "CVE-2025-58183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58183"
},
{
"name": "CVE-2023-54002",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54002"
},
{
"name": "CVE-2022-50550",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50550"
},
{
"name": "CVE-2022-0400",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0400"
},
{
"name": "CVE-2022-49138",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49138"
},
{
"name": "CVE-2025-66199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66199"
},
{
"name": "CVE-2024-42239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42239"
},
{
"name": "CVE-2022-49359",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49359"
},
{
"name": "CVE-2025-68342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68342"
},
{
"name": "CVE-2022-48673",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48673"
},
{
"name": "CVE-2022-50425",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50425"
},
{
"name": "CVE-2025-38201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38201"
},
{
"name": "CVE-2024-39293",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39293"
},
{
"name": "CVE-2023-53008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53008"
},
{
"name": "CVE-2025-38669",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38669"
},
{
"name": "CVE-2025-40137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40137"
},
{
"name": "CVE-2023-54052",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54052"
},
{
"name": "CVE-2025-22107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22107"
},
{
"name": "CVE-2024-38306",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38306"
},
{
"name": "CVE-2023-53733",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53733"
},
{
"name": "CVE-2025-37775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37775"
},
{
"name": "CVE-2025-21682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21682"
},
{
"name": "CVE-2023-1386",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1386"
},
{
"name": "CVE-2024-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35939"
},
{
"name": "CVE-2024-39298",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39298"
},
{
"name": "CVE-2024-56703",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56703"
},
{
"name": "CVE-2026-23098",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23098"
},
{
"name": "CVE-2023-53347",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53347"
},
{
"name": "CVE-2023-28374",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28374"
},
{
"name": "CVE-2023-52926",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52926"
},
{
"name": "CVE-2026-32597",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32597"
},
{
"name": "CVE-2025-68286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68286"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2024-36921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36921"
},
{
"name": "CVE-2025-40057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40057"
},
{
"name": "CVE-2024-41050",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41050"
},
{
"name": "CVE-2026-25500",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25500"
},
{
"name": "CVE-2024-26656",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26656"
},
{
"name": "CVE-2025-38520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38520"
},
{
"name": "CVE-2025-27558",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27558"
},
{
"name": "CVE-2025-71094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71094"
},
{
"name": "CVE-2026-21637",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21637"
},
{
"name": "CVE-2024-35998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35998"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2021-0076",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0076"
},
{
"name": "CVE-2025-68788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68788"
},
{
"name": "CVE-2024-58237",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58237"
},
{
"name": "CVE-2024-36909",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36909"
},
{
"name": "CVE-2024-42147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42147"
},
{
"name": "CVE-2023-53529",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53529"
},
{
"name": "CVE-2024-50028",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50028"
},
{
"name": "CVE-2023-53042",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53042"
},
{
"name": "CVE-2022-50527",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50527"
},
{
"name": "CVE-2023-54280",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54280"
},
{
"name": "CVE-2025-21786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21786"
},
{
"name": "CVE-2024-58094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58094"
},
{
"name": "CVE-2024-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11187"
},
{
"name": "CVE-2025-52534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52534"
},
{
"name": "CVE-2025-40314",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40314"
},
{
"name": "CVE-2024-46705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46705"
},
{
"name": "CVE-2022-50407",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50407"
},
{
"name": "CVE-2026-23196",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23196"
},
{
"name": "CVE-2024-26595",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26595"
},
{
"name": "CVE-2022-23825",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23825"
},
{
"name": "CVE-2024-45775",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45775"
},
{
"name": "CVE-2025-40306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40306"
},
{
"name": "CVE-2025-21881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21881"
},
{
"name": "CVE-2022-49901",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49901"
},
{
"name": "CVE-2026-23126",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23126"
},
{
"name": "CVE-2025-38329",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38329"
},
{
"name": "CVE-2021-33096",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33096"
},
{
"name": "CVE-2022-50230",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50230"
},
{
"name": "CVE-2024-35949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35949"
},
{
"name": "CVE-2025-39947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39947"
},
{
"name": "CVE-2025-68778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68778"
},
{
"name": "CVE-2023-53588",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53588"
},
{
"name": "CVE-2024-41082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41082"
},
{
"name": "CVE-2023-53685",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53685"
},
{
"name": "CVE-2025-5222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
},
{
"name": "CVE-2025-23155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23155"
},
{
"name": "CVE-2026-23054",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23054"
},
{
"name": "CVE-2025-37870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37870"
},
{
"name": "CVE-2025-40254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40254"
},
{
"name": "CVE-2022-49533",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49533"
},
{
"name": "CVE-2024-42253",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42253"
},
{
"name": "CVE-2020-26557",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26557"
},
{
"name": "CVE-2025-71064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71064"
},
{
"name": "CVE-2023-54201",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54201"
},
{
"name": "CVE-2021-33114",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33114"
},
{
"name": "CVE-2025-69645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69645"
},
{
"name": "CVE-2025-68200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68200"
},
{
"name": "CVE-2022-49518",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49518"
},
{
"name": "CVE-2024-56727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56727"
},
{
"name": "CVE-2022-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49125"
},
{
"name": "CVE-2024-36900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36900"
},
{
"name": "CVE-2025-38501",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38501"
},
{
"name": "CVE-2024-26866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26866"
},
{
"name": "CVE-2024-27010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27010"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2025-68736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68736"
},
{
"name": "CVE-2023-52561",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52561"
},
{
"name": "CVE-2025-68725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68725"
},
{
"name": "CVE-2024-53221",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53221"
},
{
"name": "CVE-2024-41069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41069"
},
{
"name": "CVE-2025-68176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68176"
},
{
"name": "CVE-2025-37777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37777"
},
{
"name": "CVE-2021-47432",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47432"
},
{
"name": "CVE-2025-68204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68204"
},
{
"name": "CVE-2024-35878",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35878"
},
{
"name": "CVE-2023-53362",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53362"
},
{
"name": "CVE-2025-68795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68795"
},
{
"name": "CVE-2025-68349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68349"
},
{
"name": "CVE-2024-26756",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26756"
},
{
"name": "CVE-2022-50815",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50815"
},
{
"name": "CVE-2025-21931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21931"
},
{
"name": "CVE-2025-39826",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39826"
},
{
"name": "CVE-2025-38036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38036"
},
{
"name": "CVE-2025-2668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2668"
},
{
"name": "CVE-2025-71221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71221"
},
{
"name": "CVE-2025-37778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37778"
},
{
"name": "CVE-2025-39716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39716"
},
{
"name": "CVE-2024-46860",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46860"
},
{
"name": "CVE-2025-22040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22040"
},
{
"name": "CVE-2024-53095",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53095"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-8277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8277"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2022-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38457"
},
{
"name": "CVE-2024-56665",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56665"
},
{
"name": "CVE-2025-38340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38340"
},
{
"name": "CVE-2025-38109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38109"
},
{
"name": "CVE-2023-53629",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53629"
},
{
"name": "CVE-2022-50178",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50178"
},
{
"name": "CVE-2025-39779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39779"
},
{
"name": "CVE-2025-66866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66866"
},
{
"name": "CVE-2025-68283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68283"
},
{
"name": "CVE-2023-7216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7216"
},
{
"name": "CVE-2025-37880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37880"
},
{
"name": "CVE-2025-36427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36427"
},
{
"name": "CVE-2026-23217",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23217"
},
{
"name": "CVE-2025-15469",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15469"
},
{
"name": "CVE-2025-37833",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37833"
},
{
"name": "CVE-2025-39761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39761"
},
{
"name": "CVE-2024-38608",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38608"
},
{
"name": "CVE-2025-68246",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68246"
},
{
"name": "CVE-2025-68339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68339"
},
{
"name": "CVE-2025-40287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40287"
},
{
"name": "CVE-2023-53320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53320"
},
{
"name": "CVE-2024-44961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44961"
},
{
"name": "CVE-2026-23069",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23069"
},
{
"name": "CVE-2025-21656",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21656"
},
{
"name": "CVE-2024-46835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46835"
},
{
"name": "CVE-2025-69650",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69650"
},
{
"name": "CVE-2022-50554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50554"
},
{
"name": "CVE-2023-53509",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53509"
},
{
"name": "CVE-2023-53421",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53421"
},
{
"name": "CVE-2025-11731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11731"
},
{
"name": "CVE-2026-22992",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22992"
},
{
"name": "CVE-2024-52005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52005"
},
{
"name": "CVE-2024-46775",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46775"
},
{
"name": "CVE-2025-39764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39764"
},
{
"name": "CVE-2025-38207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38207"
},
{
"name": "CVE-2022-49465",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49465"
},
{
"name": "CVE-2026-23004",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23004"
},
{
"name": "CVE-2024-26807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26807"
},
{
"name": "CVE-2025-39720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39720"
},
{
"name": "CVE-2023-54271",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54271"
},
{
"name": "CVE-2022-49742",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49742"
},
{
"name": "CVE-2025-71191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71191"
},
{
"name": "CVE-2025-68295",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68295"
},
{
"name": "CVE-2025-68728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68728"
},
{
"name": "CVE-2025-40780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40780"
},
{
"name": "CVE-2025-68364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68364"
},
{
"name": "CVE-2024-42118",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42118"
},
{
"name": "CVE-2025-40100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40100"
},
{
"name": "CVE-2026-1965",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1965"
},
{
"name": "CVE-2024-52560",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52560"
},
{
"name": "CVE-2024-56604",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56604"
},
{
"name": "CVE-2026-23227",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23227"
},
{
"name": "CVE-2025-71087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71087"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2023-52653",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52653"
},
{
"name": "CVE-2025-40285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40285"
},
{
"name": "CVE-2023-52508",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52508"
},
{
"name": "CVE-2025-69647",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69647"
},
{
"name": "CVE-2025-39827",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39827"
},
{
"name": "CVE-2024-50014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50014"
},
{
"name": "CVE-2022-49108",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49108"
},
{
"name": "CVE-2024-56677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56677"
},
{
"name": "CVE-2025-38717",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38717"
},
{
"name": "CVE-2026-3497",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3497"
},
{
"name": "CVE-2025-22019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22019"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-40208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40208"
},
{
"name": "CVE-2025-39746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39746"
},
{
"name": "CVE-2024-26767",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26767"
},
{
"name": "CVE-2025-21872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21872"
},
{
"name": "CVE-2026-2219",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2219"
},
{
"name": "CVE-2025-68287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68287"
},
{
"name": "CVE-2025-40039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40039"
},
{
"name": "CVE-2025-38208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38208"
},
{
"name": "CVE-2024-35926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35926"
},
{
"name": "CVE-2024-27389",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27389"
},
{
"name": "CVE-2024-26983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26983"
},
{
"name": "CVE-2022-50627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50627"
},
{
"name": "CVE-2024-50285",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50285"
},
{
"name": "CVE-2025-38099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38099"
},
{
"name": "CVE-2025-38524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38524"
},
{
"name": "CVE-2025-38029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38029"
},
{
"name": "CVE-2022-49123",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49123"
},
{
"name": "CVE-2024-50289",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50289"
},
{
"name": "CVE-2023-53258",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53258"
},
{
"name": "CVE-2024-46813",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46813"
},
{
"name": "CVE-2024-38594",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38594"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2024-47658",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47658"
},
{
"name": "CVE-2022-41409",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41409"
},
{
"name": "CVE-2025-38096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38096"
},
{
"name": "CVE-2024-48873",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48873"
},
{
"name": "CVE-2025-68746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68746"
},
{
"name": "CVE-2023-53429",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53429"
},
{
"name": "CVE-2024-46765",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46765"
},
{
"name": "CVE-2022-50380",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50380"
},
{
"name": "CVE-2025-38039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38039"
},
{
"name": "CVE-2022-48990",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48990"
},
{
"name": "CVE-2024-24864",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24864"
},
{
"name": "CVE-2024-35832",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35832"
},
{
"name": "CVE-2024-36479",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36479"
},
{
"name": "CVE-2025-71133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71133"
},
{
"name": "CVE-2026-23220",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23220"
},
{
"name": "CVE-2024-45782",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45782"
},
{
"name": "CVE-2022-50785",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50785"
},
{
"name": "CVE-2025-39745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39745"
},
{
"name": "CVE-2024-35799",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35799"
},
{
"name": "CVE-2025-40103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40103"
},
{
"name": "CVE-2026-23020",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23020"
},
{
"name": "CVE-2025-38595",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38595"
},
{
"name": "CVE-2025-71223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71223"
},
{
"name": "CVE-2025-36098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36098"
},
{
"name": "CVE-2025-68796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68796"
},
{
"name": "CVE-2025-40016",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40016"
},
{
"name": "CVE-2023-53765",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53765"
},
{
"name": "CVE-2025-38626",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38626"
},
{
"name": "CVE-2025-40356",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40356"
},
{
"name": "CVE-2026-1642",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1642"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2023-53325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53325"
},
{
"name": "CVE-2025-21752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21752"
},
{
"name": "CVE-2026-27138",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27138"
},
{
"name": "CVE-2025-40312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40312"
},
{
"name": "CVE-2025-37852",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37852"
},
{
"name": "CVE-2025-68220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68220"
},
{
"name": "CVE-2025-22125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22125"
},
{
"name": "CVE-2019-6293",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6293"
},
{
"name": "CVE-2024-26953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26953"
},
{
"name": "CVE-2024-39282",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39282"
},
{
"name": "CVE-2025-21738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21738"
},
{
"name": "CVE-2023-50868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50868"
},
{
"name": "CVE-2025-68302",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68302"
},
{
"name": "CVE-2024-50146",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50146"
},
{
"name": "CVE-2025-68238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68238"
},
{
"name": "CVE-2024-56709",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56709"
},
{
"name": "CVE-2025-38063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38063"
},
{
"name": "CVE-2025-68297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68297"
},
{
"name": "CVE-2024-40975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40975"
},
{
"name": "CVE-2025-68175",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68175"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2023-54227",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54227"
},
{
"name": "CVE-2023-46316",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46316"
},
{
"name": "CVE-2024-47866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47866"
},
{
"name": "CVE-2024-44970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44970"
},
{
"name": "CVE-2022-49476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49476"
},
{
"name": "CVE-2023-53855",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53855"
},
{
"name": "CVE-2026-23208",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23208"
},
{
"name": "CVE-2025-68804",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68804"
},
{
"name": "CVE-2025-39925",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39925"
},
{
"name": "CVE-2025-68769",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68769"
},
{
"name": "CVE-2024-50286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50286"
},
{
"name": "CVE-2025-40139",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40139"
},
{
"name": "CVE-2025-68794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68794"
},
{
"name": "CVE-2025-21768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21768"
},
{
"name": "CVE-2022-48667",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48667"
},
{
"name": "CVE-2025-69419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69419"
},
{
"name": "CVE-2024-56744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56744"
},
{
"name": "CVE-2025-38491",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38491"
},
{
"name": "CVE-2026-3783",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3783"
},
{
"name": "CVE-2022-49161",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49161"
},
{
"name": "CVE-2021-21240",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21240"
},
{
"name": "CVE-2022-48771",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48771"
},
{
"name": "CVE-2025-37961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37961"
},
{
"name": "CVE-2025-23131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23131"
},
{
"name": "CVE-2024-27400",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27400"
},
{
"name": "CVE-2023-52485",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52485"
},
{
"name": "CVE-2025-40309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40309"
},
{
"name": "CVE-2022-49997",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49997"
},
{
"name": "CVE-2022-49469",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49469"
},
{
"name": "CVE-2025-38408",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38408"
},
{
"name": "CVE-2026-23179",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23179"
},
{
"name": "CVE-2025-68334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68334"
},
{
"name": "CVE-2025-40343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40343"
},
{
"name": "CVE-2025-38644",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38644"
},
{
"name": "CVE-2025-38692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38692"
},
{
"name": "CVE-2022-0480",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0480"
},
{
"name": "CVE-2025-68173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68173"
},
{
"name": "CVE-2024-49932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49932"
},
{
"name": "CVE-2026-23090",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23090"
},
{
"name": "CVE-2026-23035",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23035"
},
{
"name": "CVE-2023-53209",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53209"
},
{
"name": "CVE-2023-54253",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54253"
},
{
"name": "CVE-2025-38127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38127"
},
{
"name": "CVE-2025-22103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22103"
},
{
"name": "CVE-2025-1272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1272"
},
{
"name": "CVE-2025-21658",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21658"
},
{
"name": "CVE-2022-49651",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49651"
},
{
"name": "CVE-2025-68307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68307"
},
{
"name": "CVE-2025-40308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40308"
},
{
"name": "CVE-2024-26770",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26770"
},
{
"name": "CVE-2023-54324",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54324"
},
{
"name": "CVE-2024-27041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27041"
},
{
"name": "CVE-2025-36184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36184"
},
{
"name": "CVE-2026-3195",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3195"
},
{
"name": "CVE-2025-37743",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37743"
},
{
"name": "CVE-2025-40005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40005"
},
{
"name": "CVE-2025-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37920"
},
{
"name": "CVE-2024-56326",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56326"
},
{
"name": "CVE-2023-26242",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26242"
},
{
"name": "CVE-2025-58185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58185"
},
{
"name": "CVE-2025-40315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40315"
},
{
"name": "CVE-2023-52673",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52673"
},
{
"name": "CVE-2024-56722",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56722"
},
{
"name": "CVE-2021-33113",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33113"
},
{
"name": "CVE-2022-48668",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48668"
},
{
"name": "CVE-2024-27418",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27418"
},
{
"name": "CVE-2025-68231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68231"
},
{
"name": "CVE-2021-22930",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22930"
},
{
"name": "CVE-2026-23064",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23064"
},
{
"name": "CVE-2025-38591",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38591"
},
{
"name": "CVE-2025-68806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68806"
},
{
"name": "CVE-2022-50322",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50322"
},
{
"name": "CVE-2023-50782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50782"
},
{
"name": "CVE-2022-27635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27635"
},
{
"name": "CVE-2025-71098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71098"
},
{
"name": "CVE-2024-49922",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49922"
},
{
"name": "CVE-2020-12317",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12317"
},
{
"name": "CVE-2025-61731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61731"
},
{
"name": "CVE-2025-40251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40251"
},
{
"name": "CVE-2024-42128",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42128"
},
{
"name": "CVE-2025-71078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71078"
},
{
"name": "CVE-2024-49909",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49909"
},
{
"name": "CVE-2025-40355",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40355"
},
{
"name": "CVE-2021-42771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42771"
},
{
"name": "CVE-2021-4095",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4095"
},
{
"name": "CVE-2022-50240",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50240"
},
{
"name": "CVE-2025-40054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40054"
},
{
"name": "CVE-2024-45015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45015"
},
{
"name": "CVE-2025-68184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68184"
},
{
"name": "CVE-2024-36357",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36357"
},
{
"name": "CVE-2025-71074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71074"
},
{
"name": "CVE-2025-38673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38673"
},
{
"name": "CVE-2025-40107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40107"
},
{
"name": "CVE-2025-11234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11234"
},
{
"name": "CVE-2025-71083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71083"
},
{
"name": "CVE-2026-23061",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23061"
},
{
"name": "CVE-2023-53447",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53447"
},
{
"name": "CVE-2024-46754",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46754"
},
{
"name": "CVE-2021-0161",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0161"
},
{
"name": "CVE-2018-1121",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1121"
},
{
"name": "CVE-2022-49547",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49547"
},
{
"name": "CVE-2025-66863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66863"
},
{
"name": "CVE-2025-0622",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0622"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2024-26757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26757"
},
{
"name": "CVE-2024-49899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49899"
},
{
"name": "CVE-2022-49484",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49484"
},
{
"name": "CVE-2024-40900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40900"
},
{
"name": "CVE-2024-46748",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46748"
},
{
"name": "CVE-2025-68813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68813"
},
{
"name": "CVE-2024-50164",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50164"
},
{
"name": "CVE-2026-27137",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27137"
},
{
"name": "CVE-2023-53248",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53248"
},
{
"name": "CVE-2024-56788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56788"
},
{
"name": "CVE-2016-8660",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8660"
},
{
"name": "CVE-2024-26691",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26691"
},
{
"name": "CVE-2026-23047",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23047"
},
{
"name": "CVE-2025-22121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22121"
},
{
"name": "CVE-2024-1975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1975"
},
{
"name": "CVE-2025-38215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38215"
},
{
"name": "CVE-2025-7519",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7519"
},
{
"name": "CVE-2023-53491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53491"
},
{
"name": "CVE-2025-68365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68365"
},
{
"name": "CVE-2024-57804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57804"
},
{
"name": "CVE-2024-49908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49908"
},
{
"name": "CVE-2025-68265",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68265"
},
{
"name": "CVE-2024-50048",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50048"
},
{
"name": "CVE-2026-28421",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28421"
},
{
"name": "CVE-2026-23119",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23119"
},
{
"name": "CVE-2025-37943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37943"
},
{
"name": "CVE-2025-21918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21918"
},
{
"name": "CVE-2025-37745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37745"
},
{
"name": "CVE-2025-71085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71085"
},
{
"name": "CVE-2026-27171",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27171"
},
{
"name": "CVE-2022-50811",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50811"
},
{
"name": "CVE-2023-4133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4133"
},
{
"name": "CVE-2024-50183",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50183"
},
{
"name": "CVE-2025-38734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38734"
},
{
"name": "CVE-2023-53366",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53366"
},
{
"name": "CVE-2022-49910",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49910"
},
{
"name": "CVE-2024-27062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27062"
},
{
"name": "CVE-2022-49203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49203"
},
{
"name": "CVE-2024-40918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40918"
},
{
"name": "CVE-2024-27032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27032"
},
{
"name": "CVE-2022-50236",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50236"
},
{
"name": "CVE-2024-35932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35932"
},
{
"name": "CVE-2024-35839",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35839"
},
{
"name": "CVE-2025-68344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68344"
},
{
"name": "CVE-2026-23137",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23137"
},
{
"name": "CVE-2025-40347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40347"
},
{
"name": "CVE-2025-71154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71154"
},
{
"name": "CVE-2025-37882",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37882"
},
{
"name": "CVE-2024-35971",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35971"
},
{
"name": "CVE-2024-46762",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46762"
},
{
"name": "CVE-2023-34983",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34983"
},
{
"name": "CVE-2024-35868",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35868"
},
{
"name": "CVE-2023-53323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53323"
},
{
"name": "CVE-2026-3731",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3731"
},
{
"name": "CVE-2025-40198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40198"
},
{
"name": "CVE-2024-0760",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0760"
},
{
"name": "CVE-2025-39942",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39942"
},
{
"name": "CVE-2025-68310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68310"
},
{
"name": "CVE-2026-23222",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23222"
},
{
"name": "CVE-2025-68229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68229"
},
{
"name": "CVE-2023-52857",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52857"
},
{
"name": "CVE-2024-42107",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42107"
},
{
"name": "CVE-2025-68257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68257"
},
{
"name": "CVE-2025-39929",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39929"
},
{
"name": "CVE-2022-50304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50304"
},
{
"name": "CVE-2026-23226",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23226"
},
{
"name": "CVE-2020-26146",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26146"
},
{
"name": "CVE-2024-43844",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43844"
},
{
"name": "CVE-2023-52920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52920"
},
{
"name": "CVE-2023-52590",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52590"
},
{
"name": "CVE-2025-71084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71084"
},
{
"name": "CVE-2024-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22025"
},
{
"name": "CVE-2026-23049",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23049"
},
{
"name": "CVE-2025-68321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68321"
},
{
"name": "CVE-2021-0072",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0072"
},
{
"name": "CVE-2025-40190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40190"
},
{
"name": "CVE-2025-69652",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69652"
},
{
"name": "CVE-2025-21635",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21635"
},
{
"name": "CVE-2025-37924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37924"
},
{
"name": "CVE-2022-40133",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40133"
},
{
"name": "CVE-2020-26143",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26143"
},
{
"name": "CVE-2025-21712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21712"
},
{
"name": "CVE-2025-38353",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38353"
},
{
"name": "CVE-2025-36009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36009"
},
{
"name": "CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"name": "CVE-2024-57982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57982"
},
{
"name": "CVE-2023-52761",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52761"
},
{
"name": "CVE-2022-49773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49773"
},
{
"name": "CVE-2023-53609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53609"
},
{
"name": "CVE-2023-53478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53478"
},
{
"name": "CVE-2024-42117",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42117"
},
{
"name": "CVE-2025-23160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23160"
},
{
"name": "CVE-2023-53682",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53682"
},
{
"name": "CVE-2026-23229",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23229"
},
{
"name": "CVE-2025-40311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40311"
},
{
"name": "CVE-2025-54770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54770"
},
{
"name": "CVE-2026-3442",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3442"
},
{
"name": "CVE-2024-58238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58238"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2025-68814",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68814"
},
{
"name": "CVE-2025-22039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22039"
},
{
"name": "CVE-2025-37842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37842"
},
{
"name": "CVE-2025-39933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39933"
},
{
"name": "CVE-2025-40237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40237"
},
{
"name": "CVE-2025-47908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47908"
},
{
"name": "CVE-2022-49722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49722"
},
{
"name": "CVE-2026-23745",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23745"
},
{
"name": "CVE-2025-68780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68780"
},
{
"name": "CVE-2024-35945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35945"
},
{
"name": "CVE-2025-39990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39990"
},
{
"name": "CVE-2025-15467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15467"
},
{
"name": "CVE-2025-71081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71081"
},
{
"name": "CVE-2023-53780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53780"
},
{
"name": "CVE-2020-35501",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35501"
},
{
"name": "CVE-2024-58251",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58251"
},
{
"name": "CVE-2025-38710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38710"
},
{
"name": "CVE-2025-9820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9820"
},
{
"name": "CVE-2023-52624",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52624"
},
{
"name": "CVE-2024-56557",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56557"
},
{
"name": "CVE-2022-49699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49699"
},
{
"name": "CVE-2022-50700",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50700"
},
{
"name": "CVE-2023-52632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52632"
},
{
"name": "CVE-2024-46836",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46836"
},
{
"name": "CVE-2026-23101",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23101"
},
{
"name": "CVE-2026-23099",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23099"
},
{
"name": "CVE-2024-38556",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38556"
},
{
"name": "CVE-2025-1180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1180"
},
{
"name": "CVE-2025-38060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38060"
},
{
"name": "CVE-2022-48929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48929"
},
{
"name": "CVE-2025-55130",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55130"
},
{
"name": "CVE-2025-36070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36070"
},
{
"name": "CVE-2024-46820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46820"
},
{
"name": "CVE-2025-39770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39770"
},
{
"name": "CVE-2025-38105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38105"
},
{
"name": "CVE-2025-37744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37744"
},
{
"name": "CVE-2025-38705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38705"
},
{
"name": "CVE-2023-53198",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53198"
},
{
"name": "CVE-2023-53846",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53846"
},
{
"name": "CVE-2025-71121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71121"
},
{
"name": "CVE-2024-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35942"
},
{
"name": "CVE-2022-1247",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1247"
},
{
"name": "CVE-2025-40333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40333"
},
{
"name": "CVE-2022-50234",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50234"
},
{
"name": "CVE-2025-38082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38082"
},
{
"name": "CVE-2025-37884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37884"
},
{
"name": "CVE-2024-58054",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58054"
},
{
"name": "CVE-2024-49934",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49934"
},
{
"name": "CVE-2025-39750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39750"
},
{
"name": "CVE-2025-38022",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38022"
},
{
"name": "CVE-2026-23066",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23066"
},
{
"name": "CVE-2025-38562",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38562"
},
{
"name": "CVE-2023-4969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4969"
},
{
"name": "CVE-2024-50098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50098"
},
{
"name": "CVE-2024-35946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35946"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-53789",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53789"
},
{
"name": "CVE-2022-49858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49858"
},
{
"name": "CVE-2025-39692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39692"
},
{
"name": "CVE-2024-35959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35959"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2025-36428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36428"
},
{
"name": "CVE-2023-53520",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53520"
},
{
"name": "CVE-2026-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23085"
},
{
"name": "CVE-2023-52737",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52737"
},
{
"name": "CVE-2025-40360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40360"
},
{
"name": "CVE-2026-23209",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23209"
},
{
"name": "CVE-2025-71136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71136"
},
{
"name": "CVE-2024-35803",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35803"
},
{
"name": "CVE-2025-22105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22105"
},
{
"name": "CVE-2024-8612",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8612"
},
{
"name": "CVE-2023-52586",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52586"
},
{
"name": "CVE-2025-40332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40332"
},
{
"name": "CVE-2021-46195",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46195"
},
{
"name": "CVE-2025-68354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68354"
},
{
"name": "CVE-2025-68801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68801"
},
{
"name": "CVE-2021-33110",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33110"
},
{
"name": "CVE-2025-37834",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37834"
},
{
"name": "CVE-2025-21833",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21833"
},
{
"name": "CVE-2025-40082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40082"
},
{
"name": "CVE-2019-19378",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19378"
},
{
"name": "CVE-2026-23150",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23150"
},
{
"name": "CVE-2024-40972",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40972"
},
{
"name": "CVE-2025-61985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61985"
},
{
"name": "CVE-2025-71073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71073"
},
{
"name": "CVE-2025-38426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38426"
},
{
"name": "CVE-2025-38436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38436"
},
{
"name": "CVE-2024-36911",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36911"
},
{
"name": "CVE-2025-55131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55131"
},
{
"name": "CVE-2025-40104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40104"
},
{
"name": "CVE-2024-36917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36917"
},
{
"name": "CVE-2025-38097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38097"
},
{
"name": "CVE-2026-23236",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23236"
},
{
"name": "CVE-2023-53068",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53068"
},
{
"name": "CVE-2025-22090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22090"
},
{
"name": "CVE-2021-31615",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31615"
},
{
"name": "CVE-2024-1737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1737"
},
{
"name": "CVE-2025-40097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40097"
},
{
"name": "CVE-2022-49932",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49932"
},
{
"name": "CVE-2022-25837",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25837"
},
{
"name": "CVE-2025-68258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68258"
},
{
"name": "CVE-2024-49939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49939"
},
{
"name": "CVE-2025-38239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38239"
},
{
"name": "CVE-2024-49905",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49905"
},
{
"name": "CVE-2023-52831",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52831"
},
{
"name": "CVE-2023-53221",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53221"
},
{
"name": "CVE-2024-26719",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26719"
},
{
"name": "CVE-2022-44034",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44034"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2023-53072",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53072"
},
{
"name": "CVE-2023-2007",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2007"
},
{
"name": "CVE-2022-37341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37341"
},
{
"name": "CVE-2025-69648",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69648"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2024-50298",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50298"
},
{
"name": "CVE-2025-36424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36424"
},
{
"name": "CVE-2025-21915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21915"
},
{
"name": "CVE-2025-38590",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38590"
},
{
"name": "CVE-2024-46843",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46843"
},
{
"name": "CVE-2025-21792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21792"
},
{
"name": "CVE-2023-54016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54016"
},
{
"name": "CVE-2025-36387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36387"
},
{
"name": "CVE-2025-38709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38709"
},
{
"name": "CVE-2024-58018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58018"
},
{
"name": "CVE-2023-4408",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4408"
},
{
"name": "CVE-2025-71235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71235"
},
{
"name": "CVE-2023-53602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53602"
},
{
"name": "CVE-2023-2828",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2828"
},
{
"name": "CVE-2023-54035",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54035"
},
{
"name": "CVE-2025-40322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40322"
},
{
"name": "CVE-2023-53867",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53867"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2025-37926",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37926"
},
{
"name": "CVE-2024-46715",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46715"
},
{
"name": "CVE-2025-38038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38038"
},
{
"name": "CVE-2024-46802",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46802"
},
{
"name": "CVE-2025-39859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39859"
},
{
"name": "CVE-2025-40313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40313"
},
{
"name": "CVE-2023-52582",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52582"
},
{
"name": "CVE-2023-33053",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33053"
},
{
"name": "CVE-2025-1152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1152"
},
{
"name": "CVE-2026-24051",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24051"
},
{
"name": "CVE-2025-38015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38015"
},
{
"name": "CVE-2024-26742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26742"
},
{
"name": "CVE-2025-38449",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38449"
},
{
"name": "CVE-2025-21714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21714"
},
{
"name": "CVE-2025-38261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38261"
},
{
"name": "CVE-2024-36918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36918"
},
{
"name": "CVE-2025-37853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37853"
},
{
"name": "CVE-2025-69644",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69644"
},
{
"name": "CVE-2022-49303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49303"
},
{
"name": "CVE-2025-38126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38126"
},
{
"name": "CVE-2023-46809",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46809"
},
{
"name": "CVE-2025-59465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59465"
},
{
"name": "CVE-2025-39763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39763"
},
{
"name": "CVE-2025-21972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21972"
},
{
"name": "CVE-2023-54088",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54088"
},
{
"name": "CVE-2024-42320",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42320"
},
{
"name": "CVE-2025-38679",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38679"
},
{
"name": "CVE-2025-40271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40271"
},
{
"name": "CVE-2024-53234",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53234"
},
{
"name": "CVE-2025-11961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11961"
},
{
"name": "CVE-2025-39877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39877"
},
{
"name": "CVE-2022-3114",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3114"
},
{
"name": "CVE-2023-52916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52916"
},
{
"name": "CVE-2025-38064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38064"
},
{
"name": "CVE-2026-22991",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22991"
},
{
"name": "CVE-2024-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35937"
},
{
"name": "CVE-2022-50628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50628"
},
{
"name": "CVE-2024-56718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56718"
},
{
"name": "CVE-2024-43824",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43824"
},
{
"name": "CVE-2025-39886",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39886"
},
{
"name": "CVE-2022-50350",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50350"
},
{
"name": "CVE-2025-21831",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21831"
},
{
"name": "CVE-2022-50721",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50721"
},
{
"name": "CVE-2022-50095",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50095"
},
{
"name": "CVE-2025-40073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40073"
},
{
"name": "CVE-2024-26662",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26662"
},
{
"name": "CVE-2026-3196",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3196"
},
{
"name": "CVE-2025-61662",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61662"
},
{
"name": "CVE-2025-68308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68308"
},
{
"name": "CVE-2024-50217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50217"
},
{
"name": "CVE-2021-0168",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0168"
},
{
"name": "CVE-2026-22795",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22795"
},
{
"name": "CVE-2022-50479",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50479"
},
{
"name": "CVE-2022-50583",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50583"
},
{
"name": "CVE-2025-37806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37806"
},
{
"name": "CVE-2024-38554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38554"
},
{
"name": "CVE-2025-68822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68822"
},
{
"name": "CVE-2025-40242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40242"
},
{
"name": "CVE-2023-0030",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0030"
},
{
"name": "CVE-2024-42110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42110"
},
{
"name": "CVE-2025-37822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37822"
},
{
"name": "CVE-2025-61727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61727"
},
{
"name": "CVE-2025-39838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39838"
},
{
"name": "CVE-2025-37820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37820"
},
{
"name": "CVE-2024-53179",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53179"
},
{
"name": "CVE-2024-57945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57945"
},
{
"name": "CVE-2023-54233",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54233"
},
{
"name": "CVE-2024-43899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43899"
},
{
"name": "CVE-2025-21986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21986"
},
{
"name": "CVE-2019-15213",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15213"
},
{
"name": "CVE-2025-38234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38234"
},
{
"name": "CVE-2022-49935",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49935"
},
{
"name": "CVE-2021-44532",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44532"
},
{
"name": "CVE-2025-38011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38011"
},
{
"name": "CVE-2022-49534",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49534"
},
{
"name": "CVE-2024-57974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57974"
},
{
"name": "CVE-2024-50012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50012"
},
{
"name": "CVE-2025-68190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68190"
},
{
"name": "CVE-2023-53010",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53010"
},
{
"name": "CVE-2024-35956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35956"
},
{
"name": "CVE-2024-57888",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57888"
},
{
"name": "CVE-2024-35908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35908"
},
{
"name": "CVE-2023-54237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54237"
},
{
"name": "CVE-2025-37878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37878"
},
{
"name": "CVE-2023-53424",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53424"
},
{
"name": "CVE-2026-23207",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23207"
},
{
"name": "CVE-2025-40252",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40252"
},
{
"name": "CVE-2022-49134",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49134"
},
{
"name": "CVE-2025-21946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21946"
},
{
"name": "CVE-2025-21838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21838"
},
{
"name": "CVE-2022-49333",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49333"
},
{
"name": "CVE-2023-53791",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53791"
},
{
"name": "CVE-2024-49994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49994"
},
{
"name": "CVE-2025-53859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53859"
},
{
"name": "CVE-2019-19814",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19814"
},
{
"name": "CVE-2022-49136",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49136"
},
{
"name": "CVE-2025-68255",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68255"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2023-54081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54081"
},
{
"name": "CVE-2024-36898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36898"
},
{
"name": "CVE-2024-44962",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44962"
},
{
"name": "CVE-2025-68322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68322"
},
{
"name": "CVE-2024-35931",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35931"
},
{
"name": "CVE-2025-38702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38702"
},
{
"name": "CVE-2026-22980",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22980"
},
{
"name": "CVE-2026-23138",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23138"
},
{
"name": "CVE-2025-39927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39927"
},
{
"name": "CVE-2023-26551",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26551"
},
{
"name": "CVE-2024-46857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46857"
},
{
"name": "CVE-2024-58013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58013"
},
{
"name": "CVE-2024-53210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53210"
},
{
"name": "CVE-2023-54185",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54185"
},
{
"name": "CVE-2022-49342",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49342"
},
{
"name": "CVE-2015-8553",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8553"
},
{
"name": "CVE-2025-40277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40277"
},
{
"name": "CVE-2025-38250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38250"
},
{
"name": "CVE-2024-36966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36966"
},
{
"name": "CVE-2023-53332",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53332"
},
{
"name": "CVE-2024-35924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35924"
},
{
"name": "CVE-2024-58095",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58095"
},
{
"name": "CVE-2024-45010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45010"
},
{
"name": "CVE-2022-49471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49471"
},
{
"name": "CVE-2025-68174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68174"
},
{
"name": "CVE-2022-48976",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48976"
},
{
"name": "CVE-2025-21751",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21751"
},
{
"name": "CVE-2023-53753",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53753"
},
{
"name": "CVE-2024-41074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41074"
},
{
"name": "CVE-2026-23234",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23234"
},
{
"name": "CVE-2025-40272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40272"
},
{
"name": "CVE-2024-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50106"
},
{
"name": "CVE-2025-23162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23162"
},
{
"name": "CVE-2026-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23133"
},
{
"name": "CVE-2025-71093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71093"
},
{
"name": "CVE-2017-13694",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13694"
},
{
"name": "CVE-2025-71102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71102"
},
{
"name": "CVE-2026-23212",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23212"
},
{
"name": "CVE-2013-7445",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-7445"
},
{
"name": "CVE-2026-23170",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23170"
},
{
"name": "CVE-2023-52701",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52701"
},
{
"name": "CVE-2024-49906",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49906"
},
{
"name": "CVE-2024-26647",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26647"
},
{
"name": "CVE-2025-68759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68759"
},
{
"name": "CVE-2024-47809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47809"
},
{
"name": "CVE-2026-23204",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23204"
},
{
"name": "CVE-2022-49317",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49317"
},
{
"name": "CVE-2026-23019",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23019"
},
{
"name": "CVE-2018-12928",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12928"
},
{
"name": "CVE-2025-71188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71188"
},
{
"name": "CVE-2023-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38552"
},
{
"name": "CVE-2024-40989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40989"
},
{
"name": "CVE-2024-56607",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56607"
},
{
"name": "CVE-2025-40345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40345"
},
{
"name": "CVE-2026-27142",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27142"
},
{
"name": "CVE-2024-49904",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49904"
},
{
"name": "CVE-2023-53671",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53671"
},
{
"name": "CVE-2025-40354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40354"
},
{
"name": "CVE-2024-26938",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26938"
},
{
"name": "CVE-2026-28417",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28417"
},
{
"name": "CVE-2025-37931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37931"
},
{
"name": "CVE-2024-35999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35999"
},
{
"name": "CVE-2023-29942",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29942"
},
{
"name": "CVE-2026-23125",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23125"
},
{
"name": "CVE-2026-0966",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0966"
},
{
"name": "CVE-2022-48633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48633"
},
{
"name": "CVE-2022-3238",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3238"
},
{
"name": "CVE-2024-38557",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38557"
},
{
"name": "CVE-2026-22185",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22185"
},
{
"name": "CVE-2023-53781",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53781"
},
{
"name": "CVE-2023-53584",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53584"
},
{
"name": "CVE-2024-57809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57809"
},
{
"name": "CVE-2025-38057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38057"
},
{
"name": "CVE-2025-68733",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68733"
},
{
"name": "CVE-2024-56719",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56719"
},
{
"name": "CVE-2022-50418",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50418"
},
{
"name": "CVE-2023-53438",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53438"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2023-53460",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53460"
},
{
"name": "CVE-2026-23214",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23214"
},
{
"name": "CVE-2024-52559",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52559"
},
{
"name": "CVE-2025-68188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68188"
},
{
"name": "CVE-2025-40269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40269"
},
{
"name": "CVE-2024-56671",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56671"
},
{
"name": "CVE-2025-68335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68335"
},
{
"name": "CVE-2025-71079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71079"
},
{
"name": "CVE-2025-62626",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62626"
},
{
"name": "CVE-2025-39940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39940"
},
{
"name": "CVE-2023-52751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52751"
},
{
"name": "CVE-2022-49562",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49562"
},
{
"name": "CVE-2025-37861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37861"
},
{
"name": "CVE-2023-53483",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53483"
},
{
"name": "CVE-2023-53673",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53673"
},
{
"name": "CVE-2025-37938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37938"
},
{
"name": "CVE-2025-37746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37746"
},
{
"name": "CVE-2022-38076",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38076"
},
{
"name": "CVE-2025-38368",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38368"
},
{
"name": "CVE-2026-23178",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23178"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2025-31133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31133"
},
{
"name": "CVE-2026-22997",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22997"
},
{
"name": "CVE-2024-56368",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56368"
},
{
"name": "CVE-2025-40075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40075"
},
{
"name": "CVE-2022-49172",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49172"
},
{
"name": "CVE-2024-40979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40979"
},
{
"name": "CVE-2025-39977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39977"
},
{
"name": "CVE-2025-38331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38331"
},
{
"name": "CVE-2026-23240",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23240"
},
{
"name": "CVE-2025-68330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68330"
},
{
"name": "CVE-2026-23228",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23228"
},
{
"name": "CVE-2024-49945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49945"
},
{
"name": "CVE-2022-44033",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44033"
},
{
"name": "CVE-2024-56757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56757"
},
{
"name": "CVE-2023-53662",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53662"
},
{
"name": "CVE-2025-38069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38069"
},
{
"name": "CVE-2022-49750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49750"
},
{
"name": "CVE-2023-53707",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53707"
},
{
"name": "CVE-2023-53115",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53115"
},
{
"name": "CVE-2025-71196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71196"
},
{
"name": "CVE-2025-21645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21645"
},
{
"name": "CVE-2023-54107",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54107"
},
{
"name": "CVE-2022-48646",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48646"
},
{
"name": "CVE-2024-43912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43912"
},
{
"name": "CVE-2024-35808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35808"
},
{
"name": "CVE-2024-58012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58012"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2025-61663",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61663"
},
{
"name": "CVE-2025-68772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68772"
},
{
"name": "CVE-2024-49891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49891"
},
{
"name": "CVE-2024-36948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36948"
},
{
"name": "CVE-2022-48887",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48887"
},
{
"name": "CVE-2024-40977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40977"
},
{
"name": "CVE-2024-26948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26948"
},
{
"name": "CVE-2023-53370",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53370"
},
{
"name": "CVE-2024-53187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53187"
},
{
"name": "CVE-2023-45929",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45929"
},
{
"name": "CVE-2025-68343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68343"
},
{
"name": "CVE-2025-66382",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66382"
},
{
"name": "CVE-2024-57795",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57795"
},
{
"name": "CVE-2025-37855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37855"
},
{
"name": "CVE-2025-21816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21816"
},
{
"name": "CVE-2021-33115",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33115"
},
{
"name": "CVE-2025-21780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21780"
},
{
"name": "CVE-2020-26559",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26559"
},
{
"name": "CVE-2024-12705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12705"
},
{
"name": "CVE-2025-69421",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69421"
},
{
"name": "CVE-2020-26140",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26140"
},
{
"name": "CVE-2024-39508",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39508"
},
{
"name": "CVE-2026-23191",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23191"
},
{
"name": "CVE-2026-32249",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32249"
},
{
"name": "CVE-2025-37899",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37899"
},
{
"name": "CVE-2026-23078",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23078"
},
{
"name": "CVE-2025-40362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40362"
},
{
"name": "CVE-2025-68201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68201"
},
{
"name": "CVE-2024-43831",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43831"
},
{
"name": "CVE-2023-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30630"
},
{
"name": "CVE-2025-40289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40289"
},
{
"name": "CVE-2026-23169",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23169"
},
{
"name": "CVE-2025-38330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38330"
},
{
"name": "CVE-2025-58188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58188"
},
{
"name": "CVE-2017-13693",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13693"
},
{
"name": "CVE-2025-68768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68768"
},
{
"name": "CVE-2024-50284",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50284"
},
{
"name": "CVE-2022-49306",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49306"
},
{
"name": "CVE-2024-49898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49898"
},
{
"name": "CVE-2025-36423",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36423"
},
{
"name": "CVE-2022-49622",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49622"
},
{
"name": "CVE-2025-68785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68785"
},
{
"name": "CVE-2024-50211",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50211"
},
{
"name": "CVE-2025-38507",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38507"
},
{
"name": "CVE-2022-50284",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50284"
},
{
"name": "CVE-2025-39989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39989"
},
{
"name": "CVE-2023-6240",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6240"
},
{
"name": "CVE-2025-38014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38014"
},
{
"name": "CVE-2025-22028",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22028"
},
{
"name": "CVE-2024-41008",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41008"
},
{
"name": "CVE-2024-27035",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27035"
},
{
"name": "CVE-2023-53218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53218"
},
{
"name": "CVE-2022-25836",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25836"
},
{
"name": "CVE-2024-37354",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37354"
},
{
"name": "CVE-2025-68808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68808"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-29934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29934"
},
{
"name": "CVE-2024-27005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27005"
},
{
"name": "CVE-2025-68223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68223"
},
{
"name": "CVE-2022-49133",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49133"
},
{
"name": "CVE-2024-36951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36951"
},
{
"name": "CVE-2025-68783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68783"
},
{
"name": "CVE-2025-71147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71147"
},
{
"name": "CVE-2025-38438",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38438"
},
{
"name": "CVE-2025-40032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40032"
},
{
"name": "CVE-2023-26555",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26555"
},
{
"name": "CVE-2023-1193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1193"
},
{
"name": "CVE-2025-71220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71220"
},
{
"name": "CVE-2024-46806",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46806"
},
{
"name": "CVE-2022-50073",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50073"
},
{
"name": "CVE-2025-68724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68724"
},
{
"name": "CVE-2025-5278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5278"
},
{
"name": "CVE-2026-23103",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23103"
},
{
"name": "CVE-2026-23074",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23074"
},
{
"name": "CVE-2025-68786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68786"
},
{
"name": "CVE-2025-39732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39732"
},
{
"name": "CVE-2022-50393",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50393"
},
{
"name": "CVE-2025-68779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68779"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2025-21819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21819"
},
{
"name": "CVE-2025-48514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48514"
},
{
"name": "CVE-2024-41030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41030"
},
{
"name": "CVE-2025-71199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71199"
},
{
"name": "CVE-2024-47664",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47664"
},
{
"name": "CVE-2024-36915",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36915"
},
{
"name": "CVE-2026-25749",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25749"
},
{
"name": "CVE-2024-49504",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49504"
},
{
"name": "CVE-2025-38118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38118"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2023-53367",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53367"
},
{
"name": "CVE-2022-50500",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50500"
},
{
"name": "CVE-2019-14899",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14899"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2024-53098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53098"
},
{
"name": "CVE-2025-68797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68797"
},
{
"name": "CVE-2024-49968",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49968"
},
{
"name": "CVE-2025-68358",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68358"
},
{
"name": "CVE-2025-40206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40206"
},
{
"name": "CVE-2026-23180",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23180"
},
{
"name": "CVE-2021-0164",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0164"
},
{
"name": "CVE-2024-46870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46870"
},
{
"name": "CVE-2022-49178",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49178"
},
{
"name": "CVE-2024-22195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22195"
},
{
"name": "CVE-2023-23931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23931"
},
{
"name": "CVE-2024-49929",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49929"
},
{
"name": "CVE-2025-40257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40257"
},
{
"name": "CVE-2023-53748",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53748"
},
{
"name": "CVE-2024-26740",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26740"
},
{
"name": "CVE-2022-49173",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49173"
},
{
"name": "CVE-2024-45781",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45781"
},
{
"name": "CVE-2025-71125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71125"
},
{
"name": "CVE-2025-21947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21947"
},
{
"name": "CVE-2024-53056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53056"
},
{
"name": "CVE-2022-50551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50551"
},
{
"name": "CVE-2026-26269",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26269"
},
{
"name": "CVE-2024-43872",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43872"
},
{
"name": "CVE-2025-71108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71108"
},
{
"name": "CVE-2022-49401",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49401"
},
{
"name": "CVE-2025-71069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71069"
},
{
"name": "CVE-2025-68312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68312"
},
{
"name": "CVE-2025-68284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68284"
},
{
"name": "CVE-2025-68194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68194"
},
{
"name": "CVE-2023-52939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52939"
},
{
"name": "CVE-2024-14027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-14027"
},
{
"name": "CVE-2025-38269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38269"
},
{
"name": "CVE-2025-69649",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69649"
},
{
"name": "CVE-2024-53175",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53175"
},
{
"name": "CVE-2025-21734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21734"
},
{
"name": "CVE-2024-49859",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49859"
},
{
"name": "CVE-2025-40336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40336"
},
{
"name": "CVE-2025-37945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37945"
},
{
"name": "CVE-2025-71195",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71195"
},
{
"name": "CVE-2022-49766",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49766"
},
{
"name": "CVE-2025-6141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6141"
},
{
"name": "CVE-2025-22043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22043"
},
{
"name": "CVE-2024-49569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49569"
},
{
"name": "CVE-2025-61984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61984"
},
{
"name": "CVE-2023-52569",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52569"
},
{
"name": "CVE-2024-56609",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56609"
},
{
"name": "CVE-2022-49940",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49940"
},
{
"name": "CVE-2026-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23083"
},
{
"name": "CVE-2025-38422",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38422"
},
{
"name": "CVE-2024-56611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56611"
},
{
"name": "CVE-2025-21927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21927"
},
{
"name": "CVE-2026-23088",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23088"
},
{
"name": "CVE-2020-25743",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25743"
},
{
"name": "CVE-2022-50167",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50167"
},
{
"name": "CVE-2025-68183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68183"
},
{
"name": "CVE-2026-27704",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27704"
},
{
"name": "CVE-2022-48064",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48064"
},
{
"name": "CVE-2023-45896",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45896"
},
{
"name": "CVE-2025-37903",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37903"
},
{
"name": "CVE-2025-68774",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68774"
},
{
"name": "CVE-2024-49940",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49940"
},
{
"name": "CVE-2025-40263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40263"
},
{
"name": "CVE-2021-3735",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3735"
},
{
"name": "CVE-2025-40353",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40353"
},
{
"name": "CVE-2024-46861",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46861"
},
{
"name": "CVE-2025-40222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40222"
},
{
"name": "CVE-2022-50634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50634"
},
{
"name": "CVE-2025-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52881"
},
{
"name": "CVE-2025-54514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54514"
},
{
"name": "CVE-2025-71202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71202"
},
{
"name": "CVE-2015-7837",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7837"
},
{
"name": "CVE-2025-0677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0677"
},
{
"name": "CVE-2024-45780",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45780"
},
{
"name": "CVE-2024-46749",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46749"
},
{
"name": "CVE-2022-50492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50492"
},
{
"name": "CVE-2024-49888",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49888"
},
{
"name": "CVE-2022-50406",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50406"
},
{
"name": "CVE-2023-26552",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26552"
},
{
"name": "CVE-2024-49921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49921"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2026-23108",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23108"
},
{
"name": "CVE-2025-71180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71180"
},
{
"name": "CVE-2025-38232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38232"
},
{
"name": "CVE-2025-68244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68244"
},
{
"name": "CVE-2025-59691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59691"
},
{
"name": "CVE-2024-46830",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46830"
},
{
"name": "CVE-2023-52481",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52481"
},
{
"name": "CVE-2023-52888",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52888"
},
{
"name": "CVE-2025-22057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22057"
},
{
"name": "CVE-2024-47666",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47666"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2025-40278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40278"
},
{
"name": "CVE-2023-0160",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0160"
},
{
"name": "CVE-2024-50056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50056"
},
{
"name": "CVE-2025-71194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71194"
},
{
"name": "CVE-2026-1788",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1788"
},
{
"name": "CVE-2023-53721",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53721"
},
{
"name": "CVE-2025-22113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22113"
},
{
"name": "CVE-2025-40342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40342"
},
{
"name": "CVE-2022-50256",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50256"
},
{
"name": "CVE-2024-42091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42091"
},
{
"name": "CVE-2024-27983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27983"
},
{
"name": "CVE-2025-37907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37907"
},
{
"name": "CVE-2024-38625",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38625"
},
{
"name": "CVE-2025-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
},
{
"name": "CVE-2026-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22796"
},
{
"name": "CVE-2023-4010",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4010"
},
{
"name": "CVE-2025-38425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38425"
},
{
"name": "CVE-2024-46727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46727"
},
{
"name": "CVE-2023-54028",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54028"
},
{
"name": "CVE-2024-42129",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42129"
},
{
"name": "CVE-2023-54105",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54105"
},
{
"name": "CVE-2018-17977",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17977"
},
{
"name": "CVE-2019-1010204",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1010204"
},
{
"name": "CVE-2023-53992",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53992"
},
{
"name": "CVE-2026-26960",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26960"
},
{
"name": "CVE-2025-40210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40210"
},
{
"name": "CVE-2022-50354",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50354"
},
{
"name": "CVE-2025-61724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61724"
},
{
"name": "CVE-2026-22999",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22999"
},
{
"name": "CVE-2025-21812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21812"
},
{
"name": "CVE-2025-71082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71082"
},
{
"name": "CVE-2025-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12801"
},
{
"name": "CVE-2024-58015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58015"
},
{
"name": "CVE-2026-23068",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23068"
},
{
"name": "CVE-2024-41079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41079"
},
{
"name": "CVE-2025-68765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68765"
},
{
"name": "CVE-2026-23089",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23089"
},
{
"name": "CVE-2024-43823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43823"
},
{
"name": "CVE-2023-52589",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52589"
},
{
"name": "CVE-2022-41848",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41848"
},
{
"name": "CVE-2026-23216",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23216"
},
{
"name": "CVE-2023-53434",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53434"
},
{
"name": "CVE-2023-29935",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29935"
},
{
"name": "CVE-2023-35061",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35061"
},
{
"name": "CVE-2025-71132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71132"
},
{
"name": "CVE-2025-71225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71225"
},
{
"name": "CVE-2026-21636",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21636"
},
{
"name": "CVE-2026-23239",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23239"
},
{
"name": "CVE-2021-0172",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0172"
},
{
"name": "CVE-2024-47662",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47662"
},
{
"name": "CVE-2018-12930",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12930"
},
{
"name": "CVE-2026-23071",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23071"
},
{
"name": "CVE-2024-49970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49970"
},
{
"name": "CVE-2024-41067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41067"
},
{
"name": "CVE-2024-26844",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26844"
},
{
"name": "CVE-2025-23141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23141"
},
{
"name": "CVE-2026-23056",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23056"
},
{
"name": "CVE-2025-40193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40193"
},
{
"name": "CVE-2023-32644",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32644"
},
{
"name": "CVE-2025-71077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71077"
},
{
"name": "CVE-2025-21908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21908"
},
{
"name": "CVE-2024-46681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46681"
},
{
"name": "CVE-2024-36927",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36927"
},
{
"name": "CVE-2025-61732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61732"
},
{
"name": "CVE-2025-61723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61723"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2025-40012",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40012"
},
{
"name": "CVE-2025-40279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40279"
},
{
"name": "CVE-2026-0964",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0964"
},
{
"name": "CVE-2025-68328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68328"
},
{
"name": "CVE-2023-53178",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53178"
},
{
"name": "CVE-2024-47141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47141"
},
{
"name": "CVE-2024-8354",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8354"
},
{
"name": "CVE-2023-54323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54323"
},
{
"name": "CVE-2025-37952",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37952"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2025-0689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0689"
},
{
"name": "CVE-2022-50316",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50316"
},
{
"name": "CVE-2023-31347",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31347"
},
{
"name": "CVE-2025-40084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40084"
},
{
"name": "CVE-2025-22111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22111"
},
{
"name": "CVE-2023-53657",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53657"
},
{
"name": "CVE-2024-49915",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49915"
},
{
"name": "CVE-2026-23063",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23063"
},
{
"name": "CVE-2025-55132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55132"
},
{
"name": "CVE-2023-52732",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52732"
},
{
"name": "CVE-2022-49759",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49759"
},
{
"name": "CVE-2026-23073",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23073"
},
{
"name": "CVE-2022-49167",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49167"
},
{
"name": "CVE-2025-68311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68311"
},
{
"name": "CVE-2026-27903",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27903"
},
{
"name": "CVE-2023-54023",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54023"
},
{
"name": "CVE-2024-27056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27056"
},
{
"name": "CVE-2023-31082",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31082"
},
{
"name": "CVE-2024-41088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41088"
},
{
"name": "CVE-2025-0690",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0690"
},
{
"name": "CVE-2025-71114",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71114"
},
{
"name": "CVE-2023-53052",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53052"
},
{
"name": "CVE-2026-23058",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23058"
},
{
"name": "CVE-2022-49234",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49234"
},
{
"name": "CVE-2022-50163",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50163"
},
{
"name": "CVE-2024-36922",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36922"
},
{
"name": "CVE-2025-71067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71067"
},
{
"name": "CVE-2024-49919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49919"
},
{
"name": "CVE-2026-23238",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23238"
},
{
"name": "CVE-2025-71182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71182"
},
{
"name": "CVE-2020-26556",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26556"
},
{
"name": "CVE-2025-46394",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46394"
},
{
"name": "CVE-2025-66471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66471"
},
{
"name": "CVE-2026-23038",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23038"
},
{
"name": "CVE-2025-40341",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40341"
},
{
"name": "CVE-2025-38409",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38409"
},
{
"name": "CVE-2021-3826",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3826"
},
{
"name": "CVE-2024-26699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26699"
},
{
"name": "CVE-2024-57876",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57876"
},
{
"name": "CVE-2024-58019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58019"
},
{
"name": "CVE-2026-25679",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25679"
},
{
"name": "CVE-2026-22990",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22990"
},
{
"name": "CVE-2025-14017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14017"
},
{
"name": "CVE-2022-50390",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50390"
},
{
"name": "CVE-2026-23000",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23000"
},
{
"name": "CVE-2026-21441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21441"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-71186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71186"
},
{
"name": "CVE-2024-53220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53220"
},
{
"name": "CVE-2026-23176",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23176"
},
{
"name": "CVE-2023-53539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53539"
},
{
"name": "CVE-2025-40338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40338"
},
{
"name": "CVE-2025-68821",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68821"
},
{
"name": "CVE-2025-31648",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31648"
},
{
"name": "CVE-2026-1229",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1229"
},
{
"name": "CVE-2025-0678",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0678"
},
{
"name": "CVE-2024-41075",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41075"
},
{
"name": "CVE-2026-23026",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23026"
},
{
"name": "CVE-2024-56674",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56674"
},
{
"name": "CVE-2024-27982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27982"
},
{
"name": "CVE-2025-40195",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40195"
},
{
"name": "CVE-2024-31884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31884"
},
{
"name": "CVE-2025-21976",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21976"
},
{
"name": "CVE-2019-1563",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1563"
},
{
"name": "CVE-2026-23128",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23128"
},
{
"name": "CVE-2024-57975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57975"
},
{
"name": "CVE-2023-53574",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53574"
},
{
"name": "CVE-2022-50166",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50166"
},
{
"name": "CVE-2025-61725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61725"
},
{
"name": "CVE-2025-68325",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68325"
},
{
"name": "CVE-2025-71190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71190"
},
{
"name": "CVE-2024-56738",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56738"
},
{
"name": "CVE-2022-50778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50778"
},
{
"name": "CVE-2024-42067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42067"
},
{
"name": "CVE-2022-49971",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49971"
},
{
"name": "CVE-2025-71089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71089"
},
{
"name": "CVE-2025-21693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21693"
},
{
"name": "CVE-2025-71203",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71203"
},
{
"name": "CVE-2024-56657",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56657"
},
{
"name": "CVE-2025-39789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39789"
},
{
"name": "CVE-2022-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49124"
},
{
"name": "CVE-2024-49901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49901"
},
{
"name": "CVE-2023-52700",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52700"
},
{
"name": "CVE-2024-56583",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56583"
},
{
"name": "CVE-2022-50195",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50195"
},
{
"name": "CVE-2025-40358",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40358"
},
{
"name": "CVE-2024-40998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40998"
},
{
"name": "CVE-2024-56712",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56712"
},
{
"name": "CVE-2025-68318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68318"
},
{
"name": "CVE-2022-49980",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49980"
},
{
"name": "CVE-2023-52634",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52634"
},
{
"name": "CVE-2025-22104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22104"
},
{
"name": "CVE-2022-2795",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2795"
},
{
"name": "CVE-2025-62526",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62526"
},
{
"name": "CVE-2024-49918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49918"
},
{
"name": "CVE-2025-68296",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68296"
},
{
"name": "CVE-2023-53785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53785"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2024-45776",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45776"
},
{
"name": "CVE-2022-50090",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50090"
},
{
"name": "CVE-2025-40340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40340"
},
{
"name": "CVE-2025-68332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68332"
},
{
"name": "CVE-2020-14356",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14356"
},
{
"name": "CVE-2025-68745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68745"
},
{
"name": "CVE-2023-54263",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54263"
},
{
"name": "CVE-2025-71104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71104"
},
{
"name": "CVE-2026-22978",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22978"
},
{
"name": "CVE-2023-53764",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53764"
},
{
"name": "CVE-2024-53687",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53687"
},
{
"name": "CVE-2025-39901",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39901"
},
{
"name": "CVE-2025-40283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40283"
},
{
"name": "CVE-2025-5918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5918"
},
{
"name": "CVE-2024-38628",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38628"
},
{
"name": "CVE-2025-40324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40324"
},
{
"name": "CVE-2025-38672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38672"
},
{
"name": "CVE-2023-54181",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54181"
},
{
"name": "CVE-2025-0684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0684"
},
{
"name": "CVE-2025-10158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10158"
},
{
"name": "CVE-2025-68378",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68378"
},
{
"name": "CVE-2024-47794",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47794"
},
{
"name": "CVE-2026-23146",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23146"
},
{
"name": "CVE-2025-38272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38272"
},
{
"name": "CVE-2024-10524",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10524"
},
{
"name": "CVE-2025-40146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40146"
},
{
"name": "CVE-2025-38359",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38359"
},
{
"name": "CVE-2019-20794",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20794"
},
{
"name": "CVE-2023-53849",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53849"
},
{
"name": "CVE-2022-4543",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4543"
},
{
"name": "CVE-2025-21899",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21899"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2025-38129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38129"
},
{
"name": "CVE-2026-23037",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23037"
},
{
"name": "CVE-2023-53627",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53627"
},
{
"name": "CVE-2025-40250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40250"
},
{
"name": "CVE-2025-38091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38091"
},
{
"name": "CVE-2023-53510",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53510"
},
{
"name": "CVE-2025-40264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40264"
},
{
"name": "CVE-2025-38334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38334"
},
{
"name": "CVE-2023-53575",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53575"
},
{
"name": "CVE-2022-49516",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49516"
},
{
"name": "CVE-2025-40778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40778"
},
{
"name": "CVE-2025-38728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38728"
},
{
"name": "CVE-2022-3523",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3523"
},
{
"name": "CVE-2026-26157",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26157"
},
{
"name": "CVE-2026-23001",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23001"
},
{
"name": "CVE-2023-38417",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38417"
},
{
"name": "CVE-2025-68367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68367"
},
{
"name": "CVE-2025-71224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71224"
},
{
"name": "CVE-2025-22072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22072"
},
{
"name": "CVE-2025-68820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68820"
},
{
"name": "CVE-2021-45261",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45261"
},
{
"name": "CVE-2025-40074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40074"
},
{
"name": "CVE-2026-23193",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23193"
},
{
"name": "CVE-2025-40321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40321"
},
{
"name": "CVE-2024-47736",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47736"
},
{
"name": "CVE-2023-53037",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53037"
},
{
"name": "CVE-2024-46842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46842"
},
{
"name": "CVE-2025-71237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71237"
},
{
"name": "CVE-2025-13462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13462"
},
{
"name": "CVE-2024-50112",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50112"
},
{
"name": "CVE-2025-69646",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69646"
},
{
"name": "CVE-2023-54207",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54207"
},
{
"name": "CVE-2026-23215",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23215"
},
{
"name": "CVE-2024-28956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28956"
},
{
"name": "CVE-2025-68740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68740"
},
{
"name": "CVE-2020-26142",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26142"
},
{
"name": "CVE-2022-49955",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49955"
},
{
"name": "CVE-2023-53628",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53628"
},
{
"name": "CVE-2025-29943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29943"
},
{
"name": "CVE-2025-39978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39978"
},
{
"name": "CVE-2023-31346",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31346"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2025-40158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40158"
},
{
"name": "CVE-2024-56201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56201"
},
{
"name": "CVE-2025-38071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38071"
},
{
"name": "CVE-2025-38140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38140"
},
{
"name": "CVE-2022-50002",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50002"
},
{
"name": "CVE-2025-38621",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38621"
},
{
"name": "CVE-2025-68742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68742"
},
{
"name": "CVE-2025-39908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39908"
},
{
"name": "CVE-2026-24842",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24842"
},
{
"name": "CVE-2024-49920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49920"
},
{
"name": "CVE-2025-40282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40282"
},
{
"name": "CVE-2026-23118",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23118"
},
{
"name": "CVE-2025-34034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-34034"
},
{
"name": "CVE-2025-37984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37984"
},
{
"name": "CVE-2025-59692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59692"
},
{
"name": "CVE-2022-50116",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50116"
},
{
"name": "CVE-2018-12931",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12931"
},
{
"name": "CVE-2025-40168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40168"
},
{
"name": "CVE-2025-37856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37856"
},
{
"name": "CVE-2022-50224",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50224"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2020-13791",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13791"
},
{
"name": "CVE-2026-23950",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23950"
},
{
"name": "CVE-2024-49990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49990"
},
{
"name": "CVE-2020-15802",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15802"
},
{
"name": "CVE-2020-24240",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24240"
},
{
"name": "CVE-2024-46718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46718"
},
{
"name": "CVE-2025-68816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68816"
},
{
"name": "CVE-2024-41045",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41045"
},
{
"name": "CVE-2023-53545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53545"
},
{
"name": "CVE-2022-50552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50552"
},
{
"name": "CVE-2021-0066",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0066"
},
{
"name": "CVE-2025-38333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38333"
},
{
"name": "CVE-2023-53376",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53376"
},
{
"name": "CVE-2023-53538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53538"
},
{
"name": "CVE-2025-68192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68192"
},
{
"name": "CVE-2024-5569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5569"
},
{
"name": "CVE-2025-68379",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68379"
},
{
"name": "CVE-2022-50357",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50357"
},
{
"name": "CVE-2024-57952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57952"
},
{
"name": "CVE-2025-68256",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68256"
},
{
"name": "CVE-2025-68777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68777"
},
{
"name": "CVE-2023-52671",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52671"
},
{
"name": "CVE-2022-50303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50303"
},
{
"name": "CVE-2024-35870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35870"
},
{
"name": "CVE-2025-68254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68254"
},
{
"name": "CVE-2026-23221",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23221"
},
{
"name": "CVE-2025-38059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38059"
},
{
"name": "CVE-2024-27014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27014"
},
{
"name": "CVE-2024-36013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36013"
},
{
"name": "CVE-2024-53176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53176"
},
{
"name": "CVE-2025-37956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37956"
},
{
"name": "CVE-2025-40196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40196"
},
{
"name": "CVE-2024-49880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49880"
},
{
"name": "CVE-2023-52676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52676"
},
{
"name": "CVE-2025-38117",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38117"
},
{
"name": "CVE-2017-13165",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13165"
},
{
"name": "CVE-2025-38556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38556"
},
{
"name": "CVE-2025-68171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68171"
},
{
"name": "CVE-2025-39932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39932"
},
{
"name": "CVE-2024-47683",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47683"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2024-46811",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46811"
},
{
"name": "CVE-2025-21985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21985"
},
{
"name": "CVE-2025-22109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22109"
},
{
"name": "CVE-2025-38300",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38300"
},
{
"name": "CVE-2025-40040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40040"
},
{
"name": "CVE-2023-53635",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53635"
},
{
"name": "CVE-2025-39810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39810"
},
{
"name": "CVE-2026-22982",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22982"
},
{
"name": "CVE-2025-23132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23132"
},
{
"name": "CVE-2024-47678",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47678"
},
{
"name": "CVE-2022-49531",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49531"
},
{
"name": "CVE-2022-49504",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49504"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2022-49810",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49810"
},
{
"name": "CVE-2025-47912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47912"
},
{
"name": "CVE-2025-71109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71109"
},
{
"name": "CVE-2023-26586",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26586"
},
{
"name": "CVE-2025-38373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38373"
},
{
"name": "CVE-2025-66861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66861"
},
{
"name": "CVE-2025-40095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40095"
},
{
"name": "CVE-2025-37957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37957"
},
{
"name": "CVE-2025-38369",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38369"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2024-44950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44950"
},
{
"name": "CVE-2025-39759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39759"
},
{
"name": "CVE-2022-50332",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50332"
},
{
"name": "CVE-2023-53822",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53822"
},
{
"name": "CVE-2024-27408",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27408"
},
{
"name": "CVE-2025-71222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71222"
},
{
"name": "CVE-2022-50461",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50461"
},
{
"name": "CVE-2025-21801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21801"
},
{
"name": "CVE-2023-26554",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26554"
},
{
"name": "CVE-2025-38486",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38486"
},
{
"name": "CVE-2021-26934",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26934"
},
{
"name": "CVE-2023-53466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53466"
},
{
"name": "CVE-2025-21629",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21629"
},
{
"name": "CVE-2025-71118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71118"
},
{
"name": "CVE-2023-53168",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53168"
},
{
"name": "CVE-2022-49528",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49528"
},
{
"name": "CVE-2025-68160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68160"
},
{
"name": "CVE-2022-45888",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45888"
},
{
"name": "CVE-2022-49218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49218"
},
{
"name": "CVE-2023-52749",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52749"
},
{
"name": "CVE-2025-39754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39754"
},
{
"name": "CVE-2025-40286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40286"
},
{
"name": "CVE-2022-49967",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49967"
},
{
"name": "CVE-2025-68327",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68327"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2022-49245",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49245"
},
{
"name": "CVE-2025-38098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38098"
},
{
"name": "CVE-2023-52682",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52682"
},
{
"name": "CVE-2022-50871",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50871"
},
{
"name": "CVE-2025-71150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71150"
},
{
"name": "CVE-2025-71229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71229"
},
{
"name": "CVE-2026-23213",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23213"
},
{
"name": "CVE-2025-39958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39958"
},
{
"name": "CVE-2018-8956",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8956"
},
{
"name": "CVE-2025-40266",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40266"
},
{
"name": "CVE-2026-23091",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23091"
},
{
"name": "CVE-2025-68241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68241"
},
{
"name": "CVE-2022-49420",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49420"
},
{
"name": "CVE-2022-40964",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40964"
},
{
"name": "CVE-2026-3441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3441"
},
{
"name": "CVE-2024-36244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36244"
},
{
"name": "CVE-2023-53149",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53149"
},
{
"name": "CVE-2026-23237",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23237"
},
{
"name": "CVE-2024-49987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49987"
},
{
"name": "CVE-2025-60753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60753"
},
{
"name": "CVE-2022-50746",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50746"
},
{
"name": "CVE-2025-52565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52565"
},
{
"name": "CVE-2024-50034",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50034"
},
{
"name": "CVE-2025-38259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38259"
},
{
"name": "CVE-2025-71192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71192"
},
{
"name": "CVE-2023-53596",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53596"
},
{
"name": "CVE-2022-49943",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49943"
},
{
"name": "CVE-2022-50260",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50260"
},
{
"name": "CVE-2025-40135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40135"
},
{
"name": "CVE-2026-23121",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23121"
},
{
"name": "CVE-2020-12319",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12319"
},
{
"name": "CVE-2025-37951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37951"
},
{
"name": "CVE-2023-50495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50495"
},
{
"name": "CVE-2024-49568",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49568"
},
{
"name": "CVE-2025-21750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21750"
},
{
"name": "CVE-2024-36924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36924"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2023-3397",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3397"
},
{
"name": "CVE-2025-68734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68734"
},
{
"name": "CVE-2024-26672",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26672"
},
{
"name": "CVE-2024-57924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57924"
},
{
"name": "CVE-2025-37947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37947"
},
{
"name": "CVE-2025-68776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68776"
},
{
"name": "CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"name": "CVE-2025-71066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71066"
},
{
"name": "CVE-2026-0965",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0965"
},
{
"name": "CVE-2023-53806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53806"
},
{
"name": "CVE-2025-21817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21817"
},
{
"name": "CVE-2025-68972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68972"
},
{
"name": "CVE-2025-68799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68799"
},
{
"name": "CVE-2021-33139",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33139"
},
{
"name": "CVE-2025-58186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58186"
},
{
"name": "CVE-2025-21825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21825"
},
{
"name": "CVE-2025-38192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38192"
},
{
"name": "CVE-2025-71236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71236"
},
{
"name": "CVE-2025-68345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68345"
},
{
"name": "CVE-2025-39800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39800"
},
{
"name": "CVE-2024-50057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50057"
},
{
"name": "CVE-2025-38343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38343"
},
{
"name": "CVE-2025-71097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71097"
},
{
"name": "CVE-2024-46808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46808"
},
{
"name": "CVE-2026-26158",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26158"
},
{
"name": "CVE-2025-38202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38202"
},
{
"name": "CVE-2025-68288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68288"
},
{
"name": "CVE-2025-38168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38168"
},
{
"name": "CVE-2023-53547",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53547"
},
{
"name": "CVE-2019-20426",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20426"
},
{
"name": "CVE-2025-71107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71107"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2025-40310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40310"
},
{
"name": "CVE-2026-29786",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-29786"
},
{
"name": "CVE-2025-58187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58187"
},
{
"name": "CVE-2025-40083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40083"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2024-56584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56584"
},
{
"name": "CVE-2026-23235",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23235"
},
{
"name": "CVE-2025-71111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71111"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2025-71152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71152"
},
{
"name": "CVE-2024-42139",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42139"
},
{
"name": "CVE-2024-56692",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56692"
},
{
"name": "CVE-2024-53196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53196"
},
{
"name": "CVE-2025-38665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38665"
},
{
"name": "CVE-2022-50212",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50212"
},
{
"name": "CVE-2026-23087",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23087"
},
{
"name": "CVE-2023-54259",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54259"
},
{
"name": "CVE-2025-68802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68802"
},
{
"name": "CVE-2023-54067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54067"
},
{
"name": "CVE-2025-1369",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1369"
},
{
"name": "CVE-2022-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
},
{
"name": "CVE-2025-68317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68317"
},
{
"name": "CVE-2023-53231",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53231"
},
{
"name": "CVE-2025-71185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71185"
},
{
"name": "CVE-2022-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2961"
},
{
"name": "CVE-2025-40331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40331"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2022-49635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49635"
},
{
"name": "CVE-2024-50017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50017"
},
{
"name": "CVE-2026-23096",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23096"
},
{
"name": "CVE-2024-53241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53241"
},
{
"name": "CVE-2025-38704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38704"
},
{
"name": "CVE-2023-34969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
},
{
"name": "CVE-2021-33155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33155"
},
{
"name": "CVE-2025-68337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68337"
},
{
"name": "CVE-2024-57899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57899"
},
{
"name": "CVE-2024-49928",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49928"
},
{
"name": "CVE-2025-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21885"
},
{
"name": "CVE-2024-50187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50187"
},
{
"name": "CVE-2022-50851",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50851"
},
{
"name": "CVE-2025-36001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36001"
},
{
"name": "CVE-2022-50464",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50464"
},
{
"name": "CVE-2025-38674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38674"
},
{
"name": "CVE-2025-40093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40093"
},
{
"name": "CVE-2020-26560",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26560"
},
{
"name": "CVE-2024-26714",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26714"
},
{
"name": "CVE-2024-45777",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45777"
},
{
"name": "CVE-2025-38040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38040"
},
{
"name": "CVE-2024-40954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40954"
},
{
"name": "CVE-2022-49965",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49965"
},
{
"name": "CVE-2025-54771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54771"
},
{
"name": "CVE-2024-0564",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0564"
},
{
"name": "CVE-2025-39825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39825"
},
{
"name": "CVE-2025-71131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71131"
},
{
"name": "CVE-2022-49961",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49961"
},
{
"name": "CVE-2025-69651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69651"
},
{
"name": "CVE-2025-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38552"
},
{
"name": "CVE-2025-40335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40335"
},
{
"name": "CVE-2025-40149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40149"
},
{
"name": "CVE-2024-58098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58098"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2022-28667",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28667"
},
{
"name": "CVE-2023-53383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53383"
},
{
"name": "CVE-2024-46717",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46717"
},
{
"name": "CVE-2024-25743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25743"
},
{
"name": "CVE-2022-50704",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50704"
},
{
"name": "CVE-2025-40164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40164"
},
{
"name": "CVE-2023-54125",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54125"
},
{
"name": "CVE-2025-10911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10911"
},
{
"name": "CVE-2026-23164",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23164"
},
{
"name": "CVE-2024-41036",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41036"
},
{
"name": "CVE-2023-53751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53751"
},
{
"name": "CVE-2025-0033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0033"
},
{
"name": "CVE-2023-53743",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53743"
},
{
"name": "CVE-2024-42319",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42319"
},
{
"name": "CVE-2025-37928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37928"
},
{
"name": "CVE-2017-13716",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13716"
},
{
"name": "CVE-2024-22018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22018"
},
{
"name": "CVE-2025-71116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71116"
},
{
"name": "CVE-2022-40735",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40735"
},
{
"name": "CVE-2024-36024",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36024"
},
{
"name": "CVE-2025-21723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21723"
},
{
"name": "CVE-2023-54190",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54190"
},
{
"name": "CVE-2023-52879",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52879"
},
{
"name": "CVE-2025-68281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68281"
},
{
"name": "CVE-2023-52837",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52837"
},
{
"name": "CVE-2025-38440",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38440"
},
{
"name": "CVE-2026-23124",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23124"
},
{
"name": "CVE-2023-52981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52981"
},
{
"name": "CVE-2024-53224",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53224"
},
{
"name": "CVE-2024-49910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49910"
},
{
"name": "CVE-2025-68362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68362"
},
{
"name": "CVE-2023-53105",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53105"
},
{
"name": "CVE-2025-68236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68236"
},
{
"name": "CVE-2024-39286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39286"
},
{
"name": "CVE-2025-14524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14524"
},
{
"name": "CVE-2024-49855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49855"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2025-68333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68333"
},
{
"name": "CVE-2024-47689",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47689"
},
{
"name": "CVE-2025-71160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71160"
},
{
"name": "CVE-2025-71232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71232"
},
{
"name": "CVE-2023-52625",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52625"
},
{
"name": "CVE-2023-53353",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53353"
},
{
"name": "CVE-2024-58096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58096"
},
{
"name": "CVE-2025-38225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38225"
},
{
"name": "CVE-2023-53401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53401"
},
{
"name": "CVE-2025-22037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22037"
},
{
"name": "CVE-2023-53702",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53702"
},
{
"name": "CVE-2025-68290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68290"
},
{
"name": "CVE-2025-40280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40280"
},
{
"name": "CVE-2024-26842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26842"
},
{
"name": "CVE-2025-40099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40099"
},
{
"name": "CVE-2023-54059",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54059"
},
{
"name": "CVE-2025-71162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71162"
},
{
"name": "CVE-2021-0170",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0170"
},
{
"name": "CVE-2024-40966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40966"
},
{
"name": "CVE-2024-53133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53133"
},
{
"name": "CVE-2026-23075",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23075"
},
{
"name": "CVE-2022-50571",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50571"
},
{
"name": "CVE-2021-31879",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31879"
},
{
"name": "CVE-2026-23120",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23120"
},
{
"name": "CVE-2025-40180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40180"
},
{
"name": "CVE-2022-49393",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49393"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2025-68803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68803"
},
{
"name": "CVE-2026-22996",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22996"
},
{
"name": "CVE-2024-53091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53091"
},
{
"name": "CVE-2025-39851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39851"
},
{
"name": "CVE-2025-71204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71204"
},
{
"name": "CVE-2025-68331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68331"
},
{
"name": "CVE-2025-38244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38244"
},
{
"name": "CVE-2022-29217",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29217"
},
{
"name": "CVE-2024-26758",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26758"
},
{
"name": "CVE-2025-38080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38080"
},
{
"name": "CVE-2023-32651",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32651"
},
{
"name": "CVE-2025-37747",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37747"
},
{
"name": "CVE-2026-2297",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2297"
},
{
"name": "CVE-2026-23105",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23105"
},
{
"name": "CVE-2023-53036",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53036"
},
{
"name": "CVE-2025-38615",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38615"
},
{
"name": "CVE-2025-58181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58181"
},
{
"name": "CVE-2025-71115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71115"
},
{
"name": "CVE-2026-22976",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22976"
},
{
"name": "CVE-2022-50862",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50862"
},
{
"name": "CVE-2025-1118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1118"
},
{
"name": "CVE-2024-50166",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50166"
},
{
"name": "CVE-2024-35862",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35862"
},
{
"name": "CVE-2023-53355",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53355"
},
{
"name": "CVE-2022-25265",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25265"
},
{
"name": "CVE-2026-0967",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0967"
},
{
"name": "CVE-2026-23181",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23181"
},
{
"name": "CVE-2025-37944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37944"
},
{
"name": "CVE-2023-53558",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53558"
},
{
"name": "CVE-2025-47914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47914"
},
{
"name": "CVE-2025-68214",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68214"
},
{
"name": "CVE-2025-38703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38703"
},
{
"name": "CVE-2026-23141",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23141"
},
{
"name": "CVE-2026-22860",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22860"
},
{
"name": "CVE-2025-36365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36365"
},
{
"name": "CVE-2025-9403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9403"
},
{
"name": "CVE-2025-40247",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40247"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2024-56641",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56641"
},
{
"name": "CVE-2024-43842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43842"
},
{
"name": "CVE-2025-0686",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0686"
},
{
"name": "CVE-2025-21739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21739"
},
{
"name": "CVE-2024-49992",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49992"
},
{
"name": "CVE-2025-68781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68781"
},
{
"name": "CVE-2025-39753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39753"
},
{
"name": "CVE-2025-69418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69418"
},
{
"name": "CVE-2026-23182",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23182"
},
{
"name": "CVE-2021-0173",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0173"
},
{
"name": "CVE-2025-71112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71112"
},
{
"name": "CVE-2023-54285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54285"
},
{
"name": "CVE-2024-45778",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45778"
},
{
"name": "CVE-2026-23086",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23086"
},
{
"name": "CVE-2024-47661",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47661"
},
{
"name": "CVE-2026-28418",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28418"
},
{
"name": "CVE-2023-54151",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54151"
},
{
"name": "CVE-2025-22022",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22022"
},
{
"name": "CVE-2025-66864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66864"
},
{
"name": "CVE-2024-46803",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46803"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2025-59466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59466"
},
{
"name": "CVE-2025-40192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40192"
},
{
"name": "CVE-2025-38544",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38544"
},
{
"name": "CVE-2025-39797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39797"
},
{
"name": "CVE-2025-68818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68818"
},
{
"name": "CVE-2022-36351",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36351"
},
{
"name": "CVE-2023-52921",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52921"
},
{
"name": "CVE-2025-15468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15468"
},
{
"name": "CVE-2024-36478",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36478"
},
{
"name": "CVE-2024-43832",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43832"
},
{
"name": "CVE-2026-1299",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1299"
},
{
"name": "CVE-2024-54683",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54683"
},
{
"name": "CVE-2025-1150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1150"
},
{
"name": "CVE-2024-46720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46720"
},
{
"name": "CVE-2024-26658",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26658"
},
{
"name": "CVE-2026-2243",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2243"
},
{
"name": "CVE-2025-38198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38198"
},
{
"name": "CVE-2025-58189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58189"
},
{
"name": "CVE-2022-36087",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36087"
},
{
"name": "CVE-2024-38564",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38564"
},
{
"name": "CVE-2021-0174",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0174"
},
{
"name": "CVE-2025-8746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8746"
},
{
"name": "CVE-2025-36442",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36442"
},
{
"name": "CVE-2025-38006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38006"
},
{
"name": "CVE-2025-40102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40102"
},
{
"name": "CVE-2026-0968",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0968"
},
{
"name": "CVE-2025-40170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40170"
},
{
"name": "CVE-2025-38437",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38437"
},
{
"name": "CVE-2025-40160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40160"
},
{
"name": "CVE-2023-7008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7008"
},
{
"name": "CVE-2024-45779",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45779"
},
{
"name": "CVE-2025-40284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40284"
},
{
"name": "CVE-2025-38125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38125"
},
{
"name": "CVE-2025-40077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40077"
},
{
"name": "CVE-2024-57857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57857"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2022-50213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50213"
},
{
"name": "CVE-2024-46823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46823"
},
{
"name": "CVE-2023-32642",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32642"
},
{
"name": "CVE-2025-71227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71227"
},
{
"name": "CVE-2024-46733",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46733"
},
{
"name": "CVE-2024-41014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41014"
},
{
"name": "CVE-2022-50015",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50015"
},
{
"name": "CVE-2025-40071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40071"
},
{
"name": "CVE-2024-7883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7883"
},
{
"name": "CVE-2024-50271",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50271"
},
{
"name": "CVE-2022-50772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50772"
},
{
"name": "CVE-2024-56717",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56717"
},
{
"name": "CVE-2025-68366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68366"
},
{
"name": "CVE-2024-56707",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56707"
},
{
"name": "CVE-2023-54234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54234"
},
{
"name": "CVE-2022-45885",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45885"
},
{
"name": "CVE-2022-49783",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49783"
},
{
"name": "CVE-2025-40305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40305"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2025-47153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47153"
},
{
"name": "CVE-2025-40080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40080"
},
{
"name": "CVE-2024-53216",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53216"
},
{
"name": "CVE-2022-49539",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49539"
},
{
"name": "CVE-2024-36347",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36347"
},
{
"name": "CVE-2024-26869",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26869"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-68815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68815"
},
{
"name": "CVE-2021-20255",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20255"
},
{
"name": "CVE-2022-48979",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48979"
},
{
"name": "CVE-2025-40307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40307"
},
{
"name": "CVE-2025-71193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71193"
},
{
"name": "CVE-2023-54180",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54180"
},
{
"name": "CVE-2026-23095",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23095"
},
{
"name": "CVE-2024-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46848"
},
{
"name": "CVE-2025-68346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68346"
},
{
"name": "CVE-2025-38081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38081"
},
{
"name": "CVE-2024-36009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36009"
},
{
"name": "CVE-2025-71163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71163"
},
{
"name": "CVE-2024-36350",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36350"
},
{
"name": "CVE-2023-25951",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25951"
},
{
"name": "CVE-2025-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40211"
},
{
"name": "CVE-2023-53152",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53152"
},
{
"name": "CVE-2021-0308",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0308"
},
{
"name": "CVE-2025-68315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68315"
},
{
"name": "CVE-2024-50009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50009"
},
{
"name": "CVE-2025-39850",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39850"
},
{
"name": "CVE-2022-1205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1205"
},
{
"name": "CVE-2023-45927",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45927"
},
{
"name": "CVE-2020-25742",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25742"
},
{
"name": "CVE-2022-0987",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0987"
},
{
"name": "CVE-2025-71096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71096"
},
{
"name": "CVE-2025-71095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71095"
},
{
"name": "CVE-2025-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40217"
},
{
"name": "CVE-2025-38199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38199"
},
{
"name": "CVE-2025-39905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39905"
},
{
"name": "CVE-2025-21944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21944"
},
{
"name": "CVE-2022-50720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50720"
},
{
"name": "CVE-2025-71105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71105"
},
{
"name": "CVE-2023-50387",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50387"
},
{
"name": "CVE-2022-49529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49529"
},
{
"name": "CVE-2025-68266",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68266"
},
{
"name": "CVE-2024-27057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27057"
},
{
"name": "CVE-2025-68771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68771"
},
{
"name": "CVE-2025-39961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39961"
},
{
"name": "CVE-2025-68363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68363"
},
{
"name": "CVE-2024-54456",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54456"
},
{
"name": "CVE-2024-26876",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26876"
},
{
"name": "CVE-2025-40248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40248"
},
{
"name": "CVE-2023-52657",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52657"
},
{
"name": "CVE-2025-37876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37876"
},
{
"name": "CVE-2024-58089",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58089"
},
{
"name": "CVE-2024-36331",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36331"
},
{
"name": "CVE-2026-27571",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27571"
},
{
"name": "CVE-2025-39748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39748"
},
{
"name": "CVE-2026-22984",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22984"
},
{
"name": "CVE-2026-27139",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27139"
},
{
"name": "CVE-2022-49127",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49127"
},
{
"name": "CVE-2020-25741",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25741"
},
{
"name": "CVE-2022-50748",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50748"
},
{
"name": "CVE-2023-53767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53767"
},
{
"name": "CVE-2025-21667",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21667"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2023-49083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49083"
},
{
"name": "CVE-2025-21696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21696"
},
{
"name": "CVE-2025-68303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68303"
},
{
"name": "CVE-2025-21955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21955"
},
{
"name": "CVE-2025-39863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39863"
},
{
"name": "CVE-2025-40259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40259"
},
{
"name": "CVE-2023-53180",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53180"
},
{
"name": "CVE-2026-28419",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28419"
},
{
"name": "CVE-2025-8677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8677"
},
{
"name": "CVE-2025-38560",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38560"
},
{
"name": "CVE-2023-53385",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53385"
},
{
"name": "CVE-2026-23206",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23206"
},
{
"name": "CVE-2025-68757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68757"
},
{
"name": "CVE-2024-46678",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46678"
},
{
"name": "CVE-2024-58097",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58097"
},
{
"name": "CVE-2023-53620",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53620"
},
{
"name": "CVE-2022-50539",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50539"
},
{
"name": "CVE-2025-71068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71068"
},
{
"name": "CVE-2025-23130",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23130"
},
{
"name": "CVE-2022-49496",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49496"
},
{
"name": "CVE-2025-38349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38349"
},
{
"name": "CVE-2024-56782",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56782"
},
{
"name": "CVE-2025-39957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39957"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2023-53540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53540"
},
{
"name": "CVE-2022-49552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49552"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2023-53261",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53261"
},
{
"name": "CVE-2026-23033",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23033"
},
{
"name": "CVE-2025-39726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39726"
},
{
"name": "CVE-2024-26759",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26759"
},
{
"name": "CVE-2025-39931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39931"
},
{
"name": "CVE-2023-54187",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54187"
},
{
"name": "CVE-2026-22977",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22977"
},
{
"name": "CVE-2026-23145",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23145"
},
{
"name": "CVE-2022-44032",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44032"
},
{
"name": "CVE-2024-57895",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57895"
},
{
"name": "CVE-2023-53240",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53240"
},
{
"name": "CVE-2025-13735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13735"
},
{
"name": "CVE-2023-53694",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53694"
},
{
"name": "CVE-2024-53195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53195"
},
{
"name": "CVE-2024-35794",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35794"
},
{
"name": "CVE-2023-52829",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52829"
},
{
"name": "CVE-2026-23003",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23003"
},
{
"name": "CVE-2025-21891",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21891"
},
{
"name": "CVE-2025-38716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38716"
},
{
"name": "CVE-2025-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11187"
},
{
"name": "CVE-2024-56660",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56660"
},
{
"name": "CVE-2026-23076",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23076"
},
{
"name": "CVE-2023-54145",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54145"
},
{
"name": "CVE-2025-38033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38033"
},
{
"name": "CVE-2024-41023",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41023"
},
{
"name": "CVE-2024-47704",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47704"
},
{
"name": "CVE-2025-21672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21672"
},
{
"name": "CVE-2024-35801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35801"
},
{
"name": "CVE-2024-49978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49978"
},
{
"name": "CVE-2024-36910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36910"
},
{
"name": "CVE-2025-15079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15079"
},
{
"name": "CVE-2024-49870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49870"
},
{
"name": "CVE-2025-36366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36366"
},
{
"name": "CVE-2024-42125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42125"
},
{
"name": "CVE-2025-36123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36123"
},
{
"name": "CVE-2024-56737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56737"
},
{
"name": "CVE-2025-68168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68168"
},
{
"name": "CVE-2025-21821",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21821"
},
{
"name": "CVE-2025-68206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68206"
},
{
"name": "CVE-2020-11935",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11935"
},
{
"name": "CVE-2023-54247",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54247"
},
{
"name": "CVE-2025-68309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68309"
},
{
"name": "CVE-2023-52905",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52905"
},
{
"name": "CVE-2024-57852",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57852"
},
{
"name": "CVE-2025-40003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40003"
},
{
"name": "CVE-2025-22042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22042"
},
{
"name": "CVE-2025-71158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71158"
},
{
"name": "CVE-2022-49803",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49803"
},
{
"name": "CVE-2024-57898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57898"
},
{
"name": "CVE-2020-35503",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35503"
},
{
"name": "CVE-2024-49923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49923"
},
{
"name": "CVE-2024-56639",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56639"
},
{
"name": "CVE-2025-68372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68372"
},
{
"name": "CVE-2026-23171",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23171"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2023-53002",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53002"
},
{
"name": "CVE-2021-0183",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0183"
},
{
"name": "CVE-2025-39884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39884"
},
{
"name": "CVE-2025-39747",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39747"
},
{
"name": "CVE-2024-36914",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36914"
},
{
"name": "CVE-2026-26996",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26996"
},
{
"name": "CVE-2024-35826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35826"
},
{
"name": "CVE-2026-23112",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23112"
},
{
"name": "CVE-2022-49764",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49764"
},
{
"name": "CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"name": "CVE-2025-21651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21651"
},
{
"name": "CVE-2025-38092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38092"
},
{
"name": "CVE-2025-22124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22124"
},
{
"name": "CVE-2025-68313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68313"
},
{
"name": "CVE-2024-58053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58053"
},
{
"name": "CVE-2023-26553",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26553"
},
{
"name": "CVE-2025-60876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60876"
},
{
"name": "CVE-2025-37776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37776"
},
{
"name": "CVE-2021-23840",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23840"
},
{
"name": "CVE-2024-58077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58077"
},
{
"name": "CVE-2024-6519",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6519"
},
{
"name": "CVE-2024-46729",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46729"
},
{
"name": "CVE-2023-53850",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53850"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2022-50266",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50266"
},
{
"name": "CVE-2024-53178",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53178"
},
{
"name": "CVE-2025-71137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71137"
},
{
"name": "CVE-2026-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23084"
},
{
"name": "CVE-2023-53093",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53093"
},
{
"name": "CVE-2025-11065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11065"
},
{
"name": "CVE-2026-23190",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23190"
},
{
"name": "CVE-2025-40123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40123"
},
{
"name": "CVE-2026-22979",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22979"
},
{
"name": "CVE-2025-68301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68301"
},
{
"name": "CVE-2024-49991",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49991"
},
{
"name": "CVE-2022-50009",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50009"
},
{
"name": "CVE-2022-26047",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26047"
},
{
"name": "CVE-2024-53240",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53240"
},
{
"name": "CVE-2026-23011",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23011"
},
{
"name": "CVE-2024-36949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36949"
},
{
"name": "CVE-2023-53816",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53816"
},
{
"name": "CVE-2025-37877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37877"
},
{
"name": "CVE-2024-2193",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2193"
},
{
"name": "CVE-2025-4382",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4382"
},
{
"name": "CVE-2022-28693",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28693"
},
{
"name": "CVE-2025-71161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71161"
},
{
"name": "CVE-2025-39706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39706"
},
{
"name": "CVE-2025-22038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22038"
},
{
"name": "CVE-2025-68217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68217"
},
{
"name": "CVE-2023-54242",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54242"
},
{
"name": "CVE-2025-68289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68289"
},
{
"name": "CVE-2025-40363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40363"
},
{
"name": "CVE-2024-41062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41062"
},
{
"name": "CVE-2025-40253",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40253"
},
{
"name": "CVE-2022-48816",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48816"
},
{
"name": "CVE-2025-37800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37800"
},
{
"name": "CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"name": "CVE-2022-50518",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50518"
},
{
"name": "CVE-2022-49829",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49829"
},
{
"name": "CVE-2025-64756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64756"
},
{
"name": "CVE-2025-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21967"
},
{
"name": "CVE-2016-2568",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2568"
},
{
"name": "CVE-2020-13817",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13817"
},
{
"name": "CVE-2025-68245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68245"
},
{
"name": "CVE-2018-12929",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12929"
},
{
"name": "CVE-2024-26853",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26853"
},
{
"name": "CVE-2024-53147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53147"
},
{
"name": "CVE-2025-39952",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39952"
},
{
"name": "CVE-2025-40317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40317"
},
{
"name": "CVE-2024-45783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45783"
},
{
"name": "CVE-2026-23110",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23110"
},
{
"name": "CVE-2023-53410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53410"
},
{
"name": "CVE-2023-53254",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53254"
},
{
"name": "CVE-2024-34064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34064"
},
{
"name": "CVE-2023-47210",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47210"
},
{
"name": "CVE-2025-68809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68809"
},
{
"name": "CVE-2024-36920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36920"
},
{
"name": "CVE-2021-0165",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0165"
},
{
"name": "CVE-2025-0624",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0624"
},
{
"name": "CVE-2022-49177",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49177"
},
{
"name": "CVE-2025-38205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38205"
},
{
"name": "CVE-2026-23100",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23100"
},
{
"name": "CVE-2025-59464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59464"
},
{
"name": "CVE-2024-58241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58241"
},
{
"name": "CVE-2025-21863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21863"
},
{
"name": "CVE-2025-71120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71120"
},
{
"name": "CVE-2025-38166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38166"
},
{
"name": "CVE-2022-49833",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49833"
},
{
"name": "CVE-2026-23060",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23060"
},
{
"name": "CVE-2025-38321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38321"
},
{
"name": "CVE-2025-68282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68282"
},
{
"name": "CVE-2025-39705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39705"
},
{
"name": "CVE-2025-68817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68817"
},
{
"name": "CVE-2024-36021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36021"
},
{
"name": "CVE-2025-38045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38045"
},
{
"name": "CVE-2024-46726",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46726"
},
{
"name": "CVE-2025-40025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40025"
},
{
"name": "CVE-2024-53079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53079"
},
{
"name": "CVE-2025-68787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68787"
},
{
"name": "CVE-2025-1125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1125"
},
{
"name": "CVE-2023-53647",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53647"
},
{
"name": "CVE-2025-37954",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37954"
},
{
"name": "CVE-2025-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23133"
},
{
"name": "CVE-2025-0012",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0012"
},
{
"name": "CVE-2020-12313",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12313"
},
{
"name": "CVE-2025-71233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71233"
},
{
"name": "CVE-2025-68782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68782"
},
{
"name": "CVE-2021-0166",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0166"
},
{
"name": "CVE-2025-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21945"
},
{
"name": "CVE-2022-3872",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3872"
},
{
"name": "CVE-2025-39744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39744"
},
{
"name": "CVE-2025-71197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71197"
},
{
"name": "CVE-2025-68177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68177"
},
{
"name": "CVE-2025-68758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68758"
},
{
"name": "CVE-2024-49931",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49931"
},
{
"name": "CVE-2024-43866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43866"
},
{
"name": "CVE-2024-37021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37021"
},
{
"name": "CVE-2024-47728",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47728"
},
{
"name": "CVE-2025-68191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68191"
},
{
"name": "CVE-2026-23031",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23031"
},
{
"name": "CVE-2024-46730",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46730"
},
{
"name": "CVE-2025-71113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71113"
},
{
"name": "CVE-2025-71127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71127"
},
{
"name": "CVE-2025-37786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37786"
},
{
"name": "CVE-2024-46728",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46728"
},
{
"name": "CVE-2023-53561",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53561"
},
{
"name": "CVE-2026-22998",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22998"
},
{
"name": "CVE-2023-54172",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54172"
},
{
"name": "CVE-2026-23050",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23050"
},
{
"name": "CVE-2024-58100",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58100"
},
{
"name": "CVE-2020-0256",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0256"
},
{
"name": "CVE-2025-21673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21673"
},
{
"name": "CVE-2024-26954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26954"
},
{
"name": "CVE-2025-21634",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21634"
},
{
"name": "CVE-2024-57999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57999"
},
{
"name": "CVE-2025-38047",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38047"
},
{
"name": "CVE-2024-47738",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47738"
},
{
"name": "CVE-2025-68340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68340"
},
{
"name": "CVE-2024-41013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41013"
},
{
"name": "CVE-2023-54320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54320"
},
{
"name": "CVE-2024-43911",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43911"
},
{
"name": "CVE-2025-37959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37959"
},
{
"name": "CVE-2017-0537",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0537"
},
{
"name": "CVE-2025-38191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38191"
},
{
"name": "CVE-2023-32681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32681"
},
{
"name": "CVE-2025-68219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68219"
},
{
"name": "CVE-2022-50232",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50232"
},
{
"name": "CVE-2025-38062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38062"
},
{
"name": "CVE-2025-38531",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38531"
},
{
"name": "CVE-2023-26112",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26112"
},
{
"name": "CVE-2018-6952",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6952"
},
{
"name": "CVE-2020-14304",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14304"
},
{
"name": "CVE-2024-46834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46834"
},
{
"name": "CVE-2025-40288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40288"
},
{
"name": "CVE-2025-68239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68239"
},
{
"name": "CVE-2025-40258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40258"
},
{
"name": "CVE-2025-21894",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21894"
},
{
"name": "CVE-2025-40281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40281"
},
{
"name": "CVE-2025-68185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68185"
},
{
"name": "CVE-2025-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40304"
},
{
"name": "CVE-2025-38503",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38503"
},
{
"name": "CVE-2025-40110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40110"
},
{
"name": "CVE-2026-24001",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24001"
},
{
"name": "CVE-2025-37807",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37807"
},
{
"name": "CVE-2025-38131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38131"
},
{
"name": "CVE-2022-50016",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50016"
},
{
"name": "CVE-2025-29481",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29481"
},
{
"name": "CVE-2024-53219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53219"
},
{
"name": "CVE-2023-53009",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53009"
},
{
"name": "CVE-2025-40268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40268"
},
{
"name": "CVE-2025-61661",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61661"
},
{
"name": "CVE-2026-23111",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23111"
},
{
"name": "CVE-2024-25740",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25740"
},
{
"name": "CVE-2024-50246",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50246"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2024-57950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57950"
},
{
"name": "CVE-2025-21759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21759"
},
{
"name": "CVE-2025-40325",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40325"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2024-42321",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42321"
},
{
"name": "CVE-2026-23113",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23113"
},
{
"name": "CVE-2021-0176",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0176"
},
{
"name": "CVE-2025-1151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1151"
},
{
"name": "CVE-2022-48998",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48998"
},
{
"name": "CVE-2025-68798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68798"
},
{
"name": "CVE-2024-42273",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42273"
},
{
"name": "CVE-2025-68336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68336"
},
{
"name": "CVE-2023-53794",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53794"
},
{
"name": "CVE-2026-23157",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23157"
},
{
"name": "CVE-2025-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40303"
},
{
"name": "CVE-2025-68178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68178"
},
{
"name": "CVE-2022-49974",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49974"
},
{
"name": "CVE-2025-40337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40337"
},
{
"name": "CVE-2019-20633",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20633"
},
{
"name": "CVE-2025-38264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38264"
},
{
"name": "CVE-2021-3714",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3714"
},
{
"name": "CVE-2023-54071",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54071"
},
{
"name": "CVE-2024-56566",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56566"
},
{
"name": "CVE-2025-40036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40036"
},
{
"name": "CVE-2024-57993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57993"
},
{
"name": "CVE-2024-47745",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47745"
},
{
"name": "CVE-2025-39833",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39833"
},
{
"name": "CVE-2026-23097",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23097"
},
{
"name": "CVE-2025-37980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37980"
},
{
"name": "CVE-2024-53190",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53190"
},
{
"name": "CVE-2025-40262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40262"
},
{
"name": "CVE-2024-35784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35784"
},
{
"name": "CVE-2024-56591",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56591"
},
{
"name": "CVE-2024-56544",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56544"
},
{
"name": "CVE-2024-56647",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56647"
},
{
"name": "CVE-2025-71198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71198"
},
{
"name": "CVE-2025-21649",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21649"
},
{
"name": "CVE-2024-57976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57976"
},
{
"name": "CVE-2025-68819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68819"
},
{
"name": "CVE-2025-0685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0685"
},
{
"name": "CVE-2024-57893",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57893"
},
{
"name": "CVE-2026-23231",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23231"
},
{
"name": "CVE-2025-37879",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37879"
},
{
"name": "CVE-2022-50071",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50071"
},
{
"name": "CVE-2025-40261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40261"
},
{
"name": "CVE-2024-56180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56180"
},
{
"name": "CVE-2023-39333",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39333"
},
{
"name": "CVE-2025-38643",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38643"
},
{
"name": "CVE-2021-3864",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3864"
},
{
"name": "CVE-2025-39771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39771"
},
{
"name": "CVE-2023-52591",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52591"
},
{
"name": "CVE-2024-26648",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26648"
},
{
"name": "CVE-2025-66862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66862"
},
{
"name": "CVE-2020-11868",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11868"
},
{
"name": "CVE-2020-24352",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24352"
},
{
"name": "CVE-2024-36000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36000"
},
{
"name": "CVE-2026-23021",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23021"
},
{
"name": "CVE-2025-39819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39819"
},
{
"name": "CVE-2022-49296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49296"
},
{
"name": "CVE-2024-49914",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49914"
},
{
"name": "CVE-2025-38360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38360"
},
{
"name": "CVE-2025-68732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68732"
},
{
"name": "CVE-2025-39715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39715"
},
{
"name": "CVE-2025-36407",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36407"
},
{
"name": "CVE-2024-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0217"
},
{
"name": "CVE-2025-40323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40323"
},
{
"name": "CVE-2025-21732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21732"
},
{
"name": "CVE-2021-47658",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47658"
},
{
"name": "CVE-2025-68285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68285"
},
{
"name": "CVE-2019-12067",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12067"
},
{
"name": "CVE-2024-57843",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57843"
},
{
"name": "CVE-2025-38512",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38512"
},
{
"name": "CVE-2024-50135",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50135"
},
{
"name": "CVE-2024-49916",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49916"
},
{
"name": "CVE-2025-68119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68119"
},
{
"name": "CVE-2024-49988",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49988"
},
{
"name": "CVE-2023-52648",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52648"
},
{
"name": "CVE-2024-49861",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49861"
},
{
"name": "CVE-2026-23093",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23093"
},
{
"name": "CVE-2024-49893",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49893"
},
{
"name": "CVE-2024-44963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44963"
},
{
"name": "CVE-2023-53348",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53348"
},
{
"name": "CVE-2022-48766",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48766"
},
{
"name": "CVE-2019-15794",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15794"
},
{
"name": "CVE-2024-49917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49917"
},
{
"name": "CVE-2022-50467",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50467"
},
{
"name": "CVE-2025-37849",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37849"
},
{
"name": "CVE-2024-48875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48875"
},
{
"name": "CVE-2024-41935",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41935"
},
{
"name": "CVE-2025-38162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38162"
},
{
"name": "CVE-2022-23491",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23491"
},
{
"name": "CVE-2025-22873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22873"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2025-71183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71183"
},
{
"name": "CVE-2023-54047",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54047"
},
{
"name": "CVE-2023-53382",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53382"
},
{
"name": "CVE-2024-50060",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50060"
},
{
"name": "CVE-2025-39677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39677"
},
{
"name": "CVE-2023-53651",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53651"
},
{
"name": "CVE-2025-21832",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21832"
},
{
"name": "CVE-2025-68371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68371"
},
{
"name": "CVE-2022-50383",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50383"
},
{
"name": "CVE-2025-39707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39707"
},
{
"name": "CVE-2025-40275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40275"
},
{
"name": "CVE-2023-53387",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53387"
},
{
"name": "CVE-2026-31802",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31802"
},
{
"name": "CVE-2024-45774",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45774"
},
{
"name": "CVE-2023-54019",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54019"
},
{
"name": "CVE-2025-22053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22053"
},
{
"name": "CVE-2025-61664",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61664"
},
{
"name": "CVE-2025-68211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68211"
},
{
"name": "CVE-2026-25702",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25702"
},
{
"name": "CVE-2023-52452",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52452"
},
{
"name": "CVE-2023-42366",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42366"
},
{
"name": "CVE-2022-50863",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50863"
},
{
"name": "CVE-2025-39829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39829"
},
{
"name": "CVE-2024-35843",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35843"
},
{
"name": "CVE-2025-71091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71091"
},
{
"name": "CVE-2025-39781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39781"
},
{
"name": "CVE-2025-39762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39762"
},
{
"name": "CVE-2024-40999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40999"
},
{
"name": "CVE-2023-53292",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53292"
},
{
"name": "CVE-2023-52576",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52576"
},
{
"name": "CVE-2024-27002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27002"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2024-57887",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57887"
},
{
"name": "CVE-2025-21730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21730"
},
{
"name": "CVE-2024-35865",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35865"
},
{
"name": "CVE-2025-71184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71184"
},
{
"name": "CVE-2023-52660",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52660"
},
{
"name": "CVE-2024-35995",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35995"
},
{
"name": "CVE-2025-69420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69420"
},
{
"name": "CVE-2023-53371",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53371"
},
{
"name": "CVE-2025-38659",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38659"
},
{
"name": "CVE-2025-68227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68227"
},
{
"name": "CVE-2025-22041",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22041"
},
{
"name": "CVE-2025-40339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40339"
},
{
"name": "CVE-2025-22127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22127"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2024-27025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27025"
},
{
"name": "CVE-2025-38020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38020"
},
{
"name": "CVE-2024-27011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27011"
},
{
"name": "CVE-2025-15224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15224"
},
{
"name": "CVE-2024-26605",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26605"
},
{
"name": "CVE-2026-27904",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27904"
},
{
"name": "CVE-2024-38543",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38543"
},
{
"name": "CVE-2025-68263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68263"
},
{
"name": "CVE-2023-53187",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53187"
},
{
"name": "CVE-2025-38689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38689"
},
{
"name": "CVE-2025-68800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68800"
},
{
"name": "CVE-2025-38275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38275"
},
{
"name": "CVE-2025-68261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68261"
},
{
"name": "CVE-2022-48744",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48744"
},
{
"name": "CVE-2025-38070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38070"
},
{
"name": "CVE-2025-68755",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68755"
},
{
"name": "CVE-2025-62525",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62525"
},
{
"name": "CVE-2025-71238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71238"
},
{
"name": "CVE-2021-0175",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0175"
},
{
"name": "CVE-2024-36012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36012"
},
{
"name": "CVE-2022-48706",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48706"
},
{
"name": "CVE-2025-40334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40334"
},
{
"name": "CVE-2025-68767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68767"
},
{
"name": "CVE-2024-46716",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46716"
},
{
"name": "CVE-2012-4542",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4542"
},
{
"name": "CVE-2021-3773",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3773"
},
{
"name": "CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"name": "CVE-2022-49267",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49267"
},
{
"name": "CVE-2024-56592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56592"
},
{
"name": "CVE-2025-37854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37854"
},
{
"name": "CVE-2025-38189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38189"
},
{
"name": "CVE-2022-48628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48628"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2024-50138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50138"
},
{
"name": "CVE-2025-40319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40319"
},
{
"name": "CVE-2021-44534",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44534"
},
{
"name": "CVE-2025-14831",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14831"
},
{
"name": "CVE-2024-56565",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56565"
},
{
"name": "CVE-2025-68193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68193"
},
{
"name": "CVE-2025-68727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68727"
},
{
"name": "CVE-2024-57872",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57872"
},
{
"name": "CVE-2023-28720",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28720"
},
{
"name": "CVE-2024-53093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53093"
},
{
"name": "CVE-2026-23080",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23080"
},
{
"name": "CVE-2024-46833",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46833"
},
{
"name": "CVE-2024-47703",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47703"
},
{
"name": "CVE-2023-53742",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53742"
},
{
"name": "CVE-2025-38361",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38361"
},
{
"name": "CVE-2025-38041",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38041"
},
{
"name": "CVE-2024-53177",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53177"
},
{
"name": "CVE-2024-56588",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56588"
},
{
"name": "CVE-2023-53452",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53452"
},
{
"name": "CVE-2023-54121",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54121"
},
{
"name": "CVE-2023-6610",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6610"
},
{
"name": "CVE-2023-54261",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54261"
},
{
"name": "CVE-2022-50616",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50616"
},
{
"name": "CVE-2025-66418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66418"
},
{
"name": "CVE-2023-53544",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53544"
},
{
"name": "CVE-2025-68264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68264"
},
{
"name": "CVE-2024-49911",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49911"
},
{
"name": "CVE-2026-23154",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23154"
},
{
"name": "CVE-2022-50708",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50708"
},
{
"name": "CVE-2026-3784",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3784"
},
{
"name": "CVE-2025-68764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68764"
},
{
"name": "CVE-2025-9301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9301"
}
],
"initial_release_date": "2026-03-19T00:00:00",
"last_revision_date": "2026-03-19T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0316",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-03-19T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37219",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37219"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37211",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37211"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37215",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37215"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37218",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37218"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37220",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37220"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37216",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37216"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37221",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37221"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37213",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37213"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37217",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37217"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37212",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37212"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37214",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37214"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37222",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37222"
}
]
}
BDU:2023-00352
Vulnerability from fstec - Published: 21.08.2012{
"CVSS 2.0": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS 3.0": "AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "\u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "6.0 (Linux), \u043e\u0442 4.0 \u0434\u043e 4.20.0 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux), \u043e\u0442 5.0 \u0434\u043e 5.19.0 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u041a\u043e\u043c\u043f\u0435\u043d\u0441\u0438\u0440\u0443\u044e\u0449\u0438\u0435 \u043c\u0435\u0440\u044b:\n- \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u0435 \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u043c\u0443 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0443 \u0438\u0437 \u043e\u0431\u0449\u0435\u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b\u0445 \u0441\u0435\u0442\u0435\u0439 (\u0418\u043d\u0442\u0435\u0440\u043d\u0435\u0442);\n- \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432 \u043c\u0435\u0436\u0441\u0435\u0442\u0435\u0432\u043e\u0433\u043e \u044d\u043a\u0440\u0430\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f;\n- \u043e\u0442\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u0435 \u043d\u0435\u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c\u044b\u0445 \u0443\u0447\u0435\u0442\u043d\u044b\u0445 \u0437\u0430\u043f\u0438\u0441\u0435\u0439, \u0430 \u0442\u0430\u043a\u0436\u0435 \u0443\u0447\u0435\u0442\u043d\u044b\u0445 \u0437\u0430\u043f\u0438\u0441\u0435\u0439 \u043d\u0435\u0434\u043e\u0432\u0435\u0440\u0435\u043d\u043d\u044b\u0445 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439;\n- \u043f\u0440\u0438\u043d\u0443\u0434\u0438\u0442\u0435\u043b\u044c\u043d\u0430\u044f \u0441\u043c\u0435\u043d\u0430 \u043f\u0430\u0440\u043e\u043b\u0435\u0439 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439;\n- \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u0435 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u0435 \u043d\u0435\u0434\u043e\u0432\u0435\u0440\u0435\u043d\u043d\u044b\u0445 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 (SSH \u0438 \u043f\u0440\u043e\u0447.);\n- \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u0435 \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a \u043a\u043e\u043c\u0430\u043d\u0434\u043d\u043e\u0439 \u0441\u0442\u0440\u043e\u043a\u0435 \u0434\u043b\u044f \u043d\u0435\u0434\u043e\u0432\u0435\u0440\u0435\u043d\u043d\u044b\u0445 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439;\n- \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0430\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u043d\u044b\u0445 \u0441\u0440\u0435\u0434\u0441\u0442\u0432 \u0437\u0430\u0449\u0438\u0442\u044b;\n- \u043c\u043e\u043d\u0438\u0442\u043e\u0440\u0438\u043d\u0433 \u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0439 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439.",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "21.08.2012",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "25.01.2023",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "25.01.2023",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2023-00352",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2012-4542",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438 \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0443\u0435\u0442",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Linux",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "\u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux 6.0 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u043e\u0442 4.0 \u0434\u043e 4.20.0 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u043e\u0442 5.0 \u0434\u043e 5.19.0 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e ",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 scsi_ioctl (drivers/scsi/scsi_ioctl.c) \u044f\u0434\u0440\u0430 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Linux, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043f\u043e\u0432\u044b\u0441\u0438\u0442\u044c \u0441\u0432\u043e\u0438 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0420\u0430\u0437\u0440\u0435\u0448\u0435\u043d\u0438\u044f, \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438 \u0438 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043e\u0441\u0442\u0443\u043f\u043e\u043c (CWE-264)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 scsi_ioctl (drivers/scsi/scsi_ioctl.c) \u044f\u0434\u0440\u0430 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Linux \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u044b\u043c \u0443\u0447\u0435\u0442\u043e\u043c \u043a\u043b\u0430\u0441\u0441\u0430 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430 SCSI \u043f\u0440\u0438 \u0430\u0432\u0442\u043e\u0440\u0438\u0437\u0430\u0446\u0438\u0438 \u043a\u043e\u043c\u0430\u043d\u0434 SCSI. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043f\u043e\u0432\u044b\u0441\u0438\u0442\u044c \u0441\u0432\u043e\u0438 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0435 \u043c\u0435\u0440\u044b",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041d\u0430\u0440\u0443\u0448\u0435\u043d\u0438\u0435 \u0430\u0432\u0442\u043e\u0440\u0438\u0437\u0430\u0446\u0438\u0438",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://lore.kernel.org/all/1360163761-8541-1-git-send-email-pbonzini@redhat.com/\nhttps://lore.kernel.org/all/53FDAE65.3080208@redhat.com/\nhttps://bugzilla.suse.com/show_bug.cgi?id=807154\nhttp://marc.info/?l=linux-kernel\u0026m=135903967015813\u0026w=2\nhttp://marc.info/?l=linux-kernel\u0026m=135904012416042\u0026w=2\nhttp://rhn.redhat.com/errata/RHSA-2013-0496.html\nhttp://rhn.redhat.com/errata/RHSA-2013-0579.html\nhttp://rhn.redhat.com/errata/RHSA-2013-0882.html\nhttp://rhn.redhat.com/errata/RHSA-2013-0928.html\nhttps://bugzilla.redhat.com/show_bug.cgi?id=875360\nhttps://oss.oracle.com/git/?p=redpatch.git;a=commit;h=76a274e17114abf1a77de6b651424648ce9e10c8\nhttps://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-4542\nhttps://lkml.org/lkml/2013/1/24/279\nhttps://oss.oracle.com/git/?p=redpatch.git;a=commitdiff;h=76a274e17114abf1a77de6b651424648ce9e10c8\nhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4542\nhttps://rhn.redhat.com/errata/RHSA-2013-0496.html\nhttps://lkml.org/lkml/2013/5/23/292\nhttps://lkml.org/lkml/2014/8/27/170\nhttps://launchpad.net/bugs/1131331",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-264",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 4,6)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 5,9)"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.