Login
Log in using an SSO provider:
Fedora Account System
Red Hat Associate
Red Hat Customer
Login using a Red Hat Bugzilla account
Forgot Password
Create an Account
Red Hat Bugzilla – Bug 191138
Home
New
Search
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh111 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
Migrated Products
[?]
This site requires JavaScript to be enabled to function correctly, please enable it.
Bug 191138
-
CVE-2006-0742
Bug in IA64 unaligned access handler causes kernel panic
Summary:
CVE-2006-0742 Bug in IA64 unaligned access handler causes kernel panic
Keywords
:
Security
Status
:
CLOSED DUPLICATE of
bug 183463
Alias:
None
Product:
Red Hat Enterprise Linux 4
Classification:
Red Hat
Component:
kernel
Sub Component:
---
Version:
4.0
Hardware:
ia64
OS:
Linux
Priority:
medium
Severity:
high
Target Milestone:
---
Target Release
:
---
Assignee:
Anil S Keshavamurthy
QA Contact:
Brian Brock
Docs Contact:
URL:
Whiteboard:
reported=20060301,source=bugzilla,pub...
Depends On:
183495
Blocks:
181409
TreeView+
depends on
/
blocked
Reported:
2006-05-09 04:10 UTC by
Linda Wang
Modified:
2007-11-30 22:07 UTC (
History
)
CC List:
4 users
(
show
)
bjohnson
jbaron
lwang
security-response-team
Fixed In Version:
Doc Type:
Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed:
2006-05-23 21:57:01 UTC
Target Upstream Version:
Embargoed:
Attachments
(Terms of Use)
Links
System
ID
Private
Priority
Status
Summary
Last Updated
Red Hat Product Errata
RHSA-2006:0575
0
normal
SHIPPED_LIVE
Important: Updated kernel packages available for Red Hat Enterprise Linux 4 Update 4
2006-08-10 04:00:00 UTC
Comment 3
Jason Baron
2006-05-23 21:57:01 UTC
*** This bug has been marked as a duplicate of
183463
***
Note
You need to
log in
before you can comment on or make changes to this bug.