ID

VAR-201611-0386


CVE

CVE-2016-5195


TITLE

Linux Kernel CVE-2016-5195 Local Privilege Escalation Vulnerability

Trust: 0.3

sources: BID: 93793

DESCRIPTION

Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka "Dirty COW.". Linux kernel is prone to a local privilege-escalation vulnerability. Local attackers may exploit this issue to gain elevated privileges. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 14.04 LTS: linux-image-3.13.0-100-generic 3.13.0-100.147 linux-image-3.13.0-100-generic-lpae 3.13.0-100.147 linux-image-3.13.0-100-lowlatency 3.13.0-100.147 linux-image-3.13.0-100-powerpc-e500 3.13.0-100.147 linux-image-3.13.0-100-powerpc-e500mc 3.13.0-100.147 linux-image-3.13.0-100-powerpc-smp 3.13.0-100.147 linux-image-3.13.0-100-powerpc64-emb 3.13.0-100.147 linux-image-3.13.0-100-powerpc64-smp 3.13.0-100.147 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Advisory ID: SYSS-2024-041 Product: DiCal-RED Manufacturer: Swissphone Wireless AG Affected Version(s): Unknown Tested Version(s): 4009 Vulnerability Type: Use of Unmaintained Third Party Components (CWE-1104) Risk Level: High Solution Status: Open Manufacturer Notification: 2024-04-16 Solution Date: None Public Disclosure: 2024-08-20 CVE Reference: CVE-2016-5195, CVE-2016-7406, CVE-2019-12815 and others Author of Advisory: Sebastian Hamann, SySS GmbH ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Overview: DiCal-RED is a radio module for communication between emergency vehicles and control rooms. It provides Ethernet, Wi-Fi and cellular network connectivity and runs a Linux- and BusyBox-based operating system. The manufacturer describes the product as follows (see [1]): "The DiCal-Red radio data module reliably guides you to your destination. This is ensured by the linking of navigation (also for the transmission of position data) and various radio modules." Due to the use of unmaintained third-party software components, the device is vulnerable to numerous known security issues. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Vulnerability Details: The device's operating system is based on several well-known open-source products, such as the Linux kernel, the Dropbear SSH server and the ProFTPD FTP server. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Proof of Concept (PoC): None ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution: The manufacturer recommends not running the device in an untrusted network. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Disclosure Timeline: 2024-02-29: Vulnerability discovered 2024-04-16: Vulnerability reported to manufacturer 2024-05-10: Manufacturer states that the vulnerability will not be fixed 2024-05-14: Vulnerability reported to CERT-Bund 2024-08-13: CERT-Bund informs us that the vendor declared the product EOL 2024-08-20: Public disclosure of vulnerability ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ References: [1] Product website for DiCal-RED https://www.swissphone.com/solutions/components/terminals/radio-data-module-dical-red/ [2] SySS Security Advisory SYSS-2024-041 https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-041.txt [3] SySS Responsible Disclosure Policy https://www.syss.de/en/responsible-disclosure-policy ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Credits: This security vulnerability was found by Sebastian Hamann of SySS GmbH. Details of this security advisory may be updated in order to provide as accurate information as possible. The latest version of this security advisory is available on the SySS website. Login to the system, execute the following commands with root privileges: 2. Stop ovc processes: ovc stop 3. Stop vertica db: su pv_vertica -c "/opt/vertica/bin/adminTools -t stop_db - -d pv -i -F" 4. Update the system: yum update kernel 5. Reboot the server: /sbin/shutdown -r now HISTORY Version:1 (rev.1) - 15 June 2017 Initial release Third Party Security Patches: Third party security patches that are to be installed on systems running Hewlett Packard Enterprise (HPE) software products should be applied in accordance with the customer's patch management policy. ========================================================================== Kernel Live Patch Security Notice LSN-0021-1 April 10, 2017 linux vulnerability ========================================================================== A security issue affects these releases of Ubuntu: | Series | Base kernel | Arch | flavors | |------------------+--------------+----------+------------------| | Ubuntu 16.04 LTS | 4.4.0 | amd64 | generic | | Ubuntu 16.04 LTS | 4.4.0 | amd64 | lowlatency | Summary: Several security issues were fixed in the kernel. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2016-7916) Qidan He discovered that the ICMP implementation in the Linux kernel did not properly check the size of an ICMP header. A local attacker with CAP_NET_ADMIN could use this to expose sensitive information. (CVE-2016-8399) It was discovered that the KVM implementation for x86/x86_64 in the Linux kernel could dereference a null pointer. An attacker in a guest virtual machine could use this to cause a denial of service (system crash) in the KVM host. (CVE-2016-8630) Eyal Itkin discovered that the IP over IEEE 1394 (FireWire) implementation in the Linux kernel contained a buffer overflow when handling fragmented packets. A remote attacker could use this to possibly execute arbitrary code with administrative privileges. (CVE-2016-8633) CAI Qian discovered that the sysctl implementation in the Linux kernel did not properly perform reference counting in some situations. (CVE-2016-9191) Andrey Konovalov discovered that the SCTP implementation in the Linux kernel improperly handled validation of incoming data. (CVE-2016-9555) Dmitry Vyukov discovered that the KVM implementation in the Linux kernel did not properly initialize the Code Segment (CS) in certain error cases. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2016-9756) Andy Lutomirski and Willy Tarreau discovered that the KVM implementation in the Linux kernel did not properly emulate instructions on the SS segment register. A local attacker in a guest virtual machine could use this to cause a denial of service (guest OS crash) or possibly gain administrative privileges in the guest OS. (CVE-2017-2583) Update instructions: The problem can be corrected by updating your livepatches to the following versions: | Kernel | Version | flavors | |-----------------+----------+--------------------------| | 4.4.0-21.37 | 16.1 | generic, lowlatency | | 4.4.0-21.37 | 17.1 | generic, lowlatency | | 4.4.0-21.37 | 18.1 | generic, lowlatency | | 4.4.0-21.37 | 21.1 | generic, lowlatency | | 4.4.0-22.39 | 13.2 | generic, lowlatency | | 4.4.0-22.39 | 16.1 | generic, lowlatency | | 4.4.0-22.39 | 17.1 | generic, lowlatency | | 4.4.0-22.39 | 18.1 | generic, lowlatency | | 4.4.0-22.39 | 21.1 | generic, lowlatency | | 4.4.0-22.40 | 16.1 | generic, lowlatency | | 4.4.0-22.40 | 17.1 | generic, lowlatency | | 4.4.0-22.40 | 18.1 | generic, lowlatency | | 4.4.0-22.40 | 21.1 | generic, lowlatency | | 4.4.0-24.43 | 16.1 | generic, lowlatency | | 4.4.0-24.43 | 17.1 | generic, lowlatency | | 4.4.0-24.43 | 18.1 | generic, lowlatency | | 4.4.0-24.43 | 21.1 | generic, lowlatency | | 4.4.0-28.47 | 16.1 | generic, lowlatency | | 4.4.0-28.47 | 17.1 | generic, lowlatency | | 4.4.0-28.47 | 18.1 | generic, lowlatency | | 4.4.0-28.47 | 21.1 | generic, lowlatency | | 4.4.0-31.50 | 16.1 | generic, lowlatency | | 4.4.0-31.50 | 17.1 | generic, lowlatency | | 4.4.0-31.50 | 18.1 | generic, lowlatency | | 4.4.0-31.50 | 21.1 | generic, lowlatency | | 4.4.0-34.53 | 16.1 | generic, lowlatency | | 4.4.0-34.53 | 17.1 | generic, lowlatency | | 4.4.0-34.53 | 18.1 | generic, lowlatency | | 4.4.0-34.53 | 21.1 | generic, lowlatency | | 4.4.0-36.55 | 16.1 | generic, lowlatency | | 4.4.0-36.55 | 17.1 | generic, lowlatency | | 4.4.0-36.55 | 18.1 | generic, lowlatency | | 4.4.0-36.55 | 21.1 | generic, lowlatency | | 4.4.0-38.57 | 16.1 | generic, lowlatency | | 4.4.0-38.57 | 17.1 | generic, lowlatency | | 4.4.0-38.57 | 18.1 | generic, lowlatency | | 4.4.0-38.57 | 21.1 | generic, lowlatency | | 4.4.0-42.62 | 16.1 | generic, lowlatency | | 4.4.0-42.62 | 17.1 | generic, lowlatency | | 4.4.0-42.62 | 18.1 | generic, lowlatency | | 4.4.0-42.62 | 21.1 | generic, lowlatency | | 4.4.0-43.63 | 16.1 | generic, lowlatency | | 4.4.0-43.63 | 17.1 | generic, lowlatency | | 4.4.0-43.63 | 18.1 | generic, lowlatency | | 4.4.0-43.63 | 21.1 | generic, lowlatency | | 4.4.0-45.66 | 16.1 | generic, lowlatency | | 4.4.0-45.66 | 17.1 | generic, lowlatency | | 4.4.0-45.66 | 18.1 | generic, lowlatency | | 4.4.0-45.66 | 21.1 | generic, lowlatency | | 4.4.0-47.68 | 16.1 | generic, lowlatency | | 4.4.0-47.68 | 17.1 | generic, lowlatency | | 4.4.0-47.68 | 18.1 | generic, lowlatency | | 4.4.0-47.68 | 21.1 | generic, lowlatency | | 4.4.0-51.72 | 16.1 | generic, lowlatency | | 4.4.0-51.72 | 17.1 | generic, lowlatency | | 4.4.0-51.72 | 18.1 | generic, lowlatency | | 4.4.0-51.72 | 21.1 | generic, lowlatency | | 4.4.0-53.74 | 16.1 | generic, lowlatency | | 4.4.0-53.74 | 17.1 | generic, lowlatency | | 4.4.0-53.74 | 18.1 | generic, lowlatency | | 4.4.0-53.74 | 21.1 | generic, lowlatency | | 4.4.0-57.78 | 17.1 | generic, lowlatency | | 4.4.0-57.78 | 18.1 | generic, lowlatency | | 4.4.0-57.78 | 21.1 | generic, lowlatency | | 4.4.0-59.80 | 17.1 | generic, lowlatency | | 4.4.0-59.80 | 18.1 | generic, lowlatency | | 4.4.0-59.80 | 21.1 | generic, lowlatency | | 4.4.0-62.83 | 17.1 | generic, lowlatency | | 4.4.0-62.83 | 18.1 | generic, lowlatency | | 4.4.0-62.83 | 21.1 | generic, lowlatency | | 4.4.0-63.84 | 18.1 | generic, lowlatency | | 4.4.0-63.84 | 21.1 | generic, lowlatency | | 4.4.0-64.85 | 21.1 | generic, lowlatency | | 4.4.0-66.87 | 21.1 | generic, lowlatency | | 4.4.0-67.88 | 21.1 | generic, lowlatency | | 4.4.0-70.91 | 21.1 | generic, lowlatency | | 4.4.0-71.92 | 21.1 | generic, lowlatency | Additionally, you should install an updated kernel with these fixes and reboot at your convienience. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Note: the current version of the following document is available here: https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05341463 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c05341463 Version: 1 HPSBHF03682 rev.1 - HPE Comware 7 Network Products using SSL/TLS, Local Gain Privileged Access NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. Release Date: 2016-11-23 Last Updated: 2016-11-23 Potential Security Impact: Local: Gain Privileged Access Source: Hewlett Packard Enterprise, Product Security Response Team VULNERABILITY SUMMARY A security vulnerability in the Linux kernel could potentially impact HPE Comware 7 network products. The vulnerability could be exploited locally to gain privileged access. References: - CVE-2016-5195 - Local Gain Privileged Access, aka "Dirty COW" SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. - Comware 7 (CW7) Products All Versions - Please refer to the RESOLUTION below for a list of impacted products. BACKGROUND CVSS Base Metrics ================= Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector CVE-2016-5195 7.8 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C) Information on CVSS is documented in HPE Customer Notice HPSN-2008-002 here: https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499 RESOLUTION HPE has provided the following mitigation information from H3C to resolve the vulnerability for all Comware 7 products. **Mitigation Information:** Comware v7 products are potentially vulnerable because Comware v7 uses an affected version of the Linux kernel. However, the risk is mitigated because Comware v7 does not provide an interface that allows access to memory. Customers should always ensure that only software images provided directly from HPE are loaded on the switch. **Notes:** - Comware v5 is not vulnerable to this issue. - HPE plans to resolve this vulnerability completely in future software releases for Comware V7. **COMWARE 7 Products** + **12500 (Comware 7) - Version: See Mitigation** * HP Network Products - JC072B HP 12500 Main Processing Unit - JC085A HP A12518 Switch Chassis - JC086A HP A12508 Switch Chassis - JC652A HP 12508 DC Switch Chassis - JC653A HP 12518 DC Switch Chassis - JC654A HP 12504 AC Switch Chassis - JC655A HP 12504 DC Switch Chassis - JF430A HP A12518 Switch Chassis - JF430B HP 12518 Switch Chassis - JF430C HP 12518 AC Switch Chassis - JF431A HP A12508 Switch Chassis - JF431B HP 12508 Switch Chassis - JF431C HP 12508 AC Switch Chassis - JG497A HP 12500 MPU w/Comware V7 OS - JG782A HP FF 12508E AC Switch Chassis - JG783A HP FF 12508E DC Switch Chassis - JG784A HP FF 12518E AC Switch Chassis - JG785A HP FF 12518E DC Switch Chassis - JG802A HP FF 12500E MPU + **10500 (Comware 7) - Version: See Mitigation** * HP Network Products - JC611A HP 10508-V Switch Chassis - JC612A HP 10508 Switch Chassis - JC613A HP 10504 Switch Chassis - JC748A HP 10512 Switch Chassis - JG608A HP FlexFabric 11908-V Switch Chassis - JG609A HP FlexFabric 11900 Main Processing Unit - JG820A HP 10504 TAA Switch Chassis - JG821A HP 10508 TAA Switch Chassis - JG822A HP 10508-V TAA Switch Chassis - JG823A HP 10512 TAA Switch Chassis - JG496A HP 10500 Type A MPU w/Comware v7 OS - JH198A HP 10500 Type D Main Processing Unit with Comware v7 Operating System - JH206A HP 10500 Type D TAA-compliant with Comware v7 Operating System Main Processing Unit + **12900 (Comware 7) - Version: See Mitigation** * HP Network Products - JG619A HP FlexFabric 12910 Switch AC Chassis - JG621A HP FlexFabric 12910 Main Processing Unit - JG632A HP FlexFabric 12916 Switch AC Chassis - JG634A HP FlexFabric 12916 Main Processing Unit - JH104A HP FlexFabric 12900E Main Processing Unit - JH114A HP FlexFabric 12910 TAA-compliant Main Processing Unit - JH263A HP FlexFabric 12904E Main Processing Unit - JH255A HP FlexFabric 12908E Switch Chassis - JH262A HP FlexFabric 12904E Switch Chassis - JH113A HP FlexFabric 12910 TAA-compliant Switch AC Chassis - JH103A HP FlexFabric 12916E Switch Chassis + **5900 (Comware 7) - Version: See Mitigation** * HP Network Products - JC772A HP 5900AF-48XG-4QSFP+ Switch - JG296A HP 5920AF-24XG Switch - JG336A HP 5900AF-48XGT-4QSFP+ Switch - JG510A HP 5900AF-48G-4XG-2QSFP+ Switch - JG554A HP 5900AF-48XG-4QSFP+ TAA Switch - JG555A HP 5920AF-24XG TAA Switch - JG838A HP FF 5900CP-48XG-4QSFP+ Switch - JH036A HP FlexFabric 5900CP 48XG 4QSFP+ TAA-Compliant - JH037A HP 5900AF 48XGT 4QSFP+ TAA-Compliant Switch - JH038A HP 5900AF 48G 4XG 2QSFP+ TAA-Compliant + **MSR1000 (Comware 7) - Version: See Mitigation** * HP Network Products - JG875A HP MSR1002-4 AC Router - JH060A HP MSR1003-8S AC Router + **MSR2000 (Comware 7) - Version: See Mitigation** * HP Network Products - JG411A HP MSR2003 AC Router - JG734A HP MSR2004-24 AC Router - JG735A HP MSR2004-48 Router - JG866A HP MSR2003 TAA-compliant AC Router + **MSR3000 (Comware 7) - Version: See Mitigation** * HP Network Products - JG404A HP MSR3064 Router - JG405A HP MSR3044 Router - JG406A HP MSR3024 AC Router - JG407A HP MSR3024 DC Router - JG408A HP MSR3024 PoE Router - JG409A HP MSR3012 AC Router - JG410A HP MSR3012 DC Router - JG861A HP MSR3024 TAA-compliant AC Router + **MSR4000 (Comware 7) - Version: See Mitigation** * HP Network Products - JG402A HP MSR4080 Router Chassis - JG403A HP MSR4060 Router Chassis - JG412A HP MSR4000 MPU-100 Main Processing Unit - JG869A HP MSR4000 TAA-compliant MPU-100 Main Processing Unit + **MSR95X - Version: See Mitigation** * HP Network Products - JH296A HPE MSR954 1GbE SFP 2GbE-WAN 4GbE-LAN CWv7 Router - JH297A HPE MSR954-W 1GbE SFP (WW) 2GbE-WAN 4GbE-LAN Wireless 802.11n CWv7 Router - JH298A HPE MSR954-W 1GbE SFP LTE (AM) 2GbE-WAN 4GbE-LAN Wireless 802.11n CWv7 Router - JH299A HPE MSR954-W 1GbE SFP LTE (WW) 2GbE-WAN 4GbE-LAN Wireless 802.11n CWv7 Router - JH300A HPE FlexNetwork MSR958 1GbE and Combo 2GbE WAN 8GbE LAN Router - JH301A HPE FlexNetwork MSR958 1GbE and Combo 2GbE WAN 8GbE LAN PoE Router + **VSR (Comware 7) - Version: See Mitigation** * HP Network Products - JG810AAE HP VSR1001 Virtual Services Router 60 Day Evaluation Software - JG811AAE HP VSR1001 Comware 7 Virtual Services Router - JG812AAE HP VSR1004 Comware 7 Virtual Services Router - JG813AAE HP VSR1008 Comware 7 Virtual Services Router + **7900 (Comware 7) - Version: See Mitigation** * HP Network Products - JG682A HP FlexFabric 7904 Switch Chassis - JG841A HP FlexFabric 7910 Switch Chassis - JG842A HP FlexFabric 7910 7.2Tbps Fabric / Main Processing Unit - JH001A HP FlexFabric 7910 2.4Tbps Fabric / Main Processing Unit - JH122A HP FlexFabric 7904 TAA-compliant Switch Chassis - JH123A HP FlexFabric 7910 TAA-compliant Switch Chassis - JH124A HP FlexFabric 7910 7.2Tbps TAA-compliant Fabric/Main Processing Unit - JH125A HP FlexFabric 7910 2.4Tbps TAA-compliant Fabric/Main Processing Unit + **5130EI (Comware 7) - Version: See Mitigation** * HP Network Products - JG932A HP 5130-24G-4SFP+ EI Switch - JG933A HP 5130-24G-SFP-4SFP+ EI Switch - JG934A HP 5130-48G-4SFP+ EI Switch - JG936A HP 5130-24G-PoE+-4SFP+ (370W) EI Switch - JG937A HP 5130-48G-PoE+-4SFP+ (370W) EI Switch - JG938A HP 5130-24G-2SFP+-2XGT EI Switch - JG939A HP 5130-48G-2SFP+-2XGT EI Switch - JG940A HP 5130-24G-PoE+-2SFP+-2XGT (370W) EI Switch - JG941A HP 5130-48G-PoE+-2SFP+-2XGT (370W) EI Switch - JG975A HP 5130-24G-4SFP+ EI Brazil Switch - JG976A HP 5130-48G-4SFP+ EI Brazil Switch - JG977A HP 5130-24G-PoE+-4SFP+ (370W) EI Brazil Switch - JG978A HP 5130-48G-PoE+-4SFP+ (370W) EI Brazil Switch + **6125XLG - Version: See Mitigation** * HP Network Products - 711307-B21 HP 6125XLG Blade Switch - 737230-B21 HP 6125XLG Blade Switch with TAA + **6127XLG - Version: See Mitigation** * HP Network Products - 787635-B21 HP 6127XLG Blade Switch Opt Kit - 787635-B22 HP 6127XLG Blade Switch Opt Kit TAA + **Moonshot - Version: See Mitigation** * HP Network Products - 786617-B21 - HP Moonshot-45Gc Switch Module - 704654-B21 - HP Moonshot-45XGc Switch Module - 786619-B21 - HP Moonshot-180XGc Switch Module + **5700 (Comware 7) - Version: See Mitigation** * HP Network Products - JG894A HP FlexFabric 5700-48G-4XG-2QSFP+ Switch - JG895A HP FlexFabric 5700-48G-4XG-2QSFP+ TAA-compliant Switch - JG896A HP FlexFabric 5700-40XG-2QSFP+ Switch - JG897A HP FlexFabric 5700-40XG-2QSFP+ TAA-compliant Switch - JG898A HP FlexFabric 5700-32XGT-8XG-2QSFP+ Switch - JG899A HP FlexFabric 5700-32XGT-8XG-2QSFP+ TAA-compliant Switch + **5930 (Comware 7) - Version: See Mitigation** * HP Network Products - JG726A HP FlexFabric 5930 32QSFP+ Switch - JG727A HP FlexFabric 5930 32QSFP+ TAA-compliant Switch - JH178A HP FlexFabric 5930 2QSFP+ 2-slot Switch - JH179A HP FlexFabric 5930 4-slot Switch - JH187A HP FlexFabric 5930 2QSFP+ 2-slot TAA-compliant Switch - JH188A HP FlexFabric 5930 4-slot TAA-compliant Switch + **HSR6600 (Comware 7) - Version: See Mitigation** * HP Network Products - JG353A HP HSR6602-G Router - JG354A HP HSR6602-XG Router - JG776A HP HSR6602-G TAA-compliant Router - JG777A HP HSR6602-XG TAA-compliant Router + **HSR6800 (Comware 7) - Version: See Mitigation** * HP Network Products - JG361A HP HSR6802 Router Chassis - JG361B HP HSR6802 Router Chassis - JG362A HP HSR6804 Router Chassis - JG362B HP HSR6804 Router Chassis - JG363A HP HSR6808 Router Chassis - JG363B HP HSR6808 Router Chassis - JG364A HP HSR6800 RSE-X2 Router Main Processing Unit - JG779A HP HSR6800 RSE-X2 Router TAA-compliant Main Processing - JH075A HP HSR6800 RSE-X3 Router Main Processing Unit + **1950 (Comware 7) - Version: See Mitigation** * HP Network Products - JG960A HP 1950-24G-4XG Switch - JG961A HP 1950-48G-2SFP+-2XGT Switch - JG962A HP 1950-24G-2SFP+-2XGT-PoE+(370W) Switch - JG963A HP 1950-48G-2SFP+-2XGT-PoE+(370W) Switch + **7500 (Comware 7) - Version: See Mitigation** * HP Network Products - JD238C HP 7510 Switch Chassis - JD239C HP 7506 Switch Chassis - JD240C HP 7503 Switch Chassis - JD242C HP 7502 Switch Chassis - JH207A HP 7500 1.2Tbps Fabric with 2-port 40GbE QSFP+ for IRF-Only Main Processing Unit - JH208A HP 7502 Main Processing Unit - JH209A HP 7500 2.4Tbps Fabric with 8-port 1/10GbE SFP+ and 2-port 40GbE QSFP+ Main Processing Unit + **5130HI - Version: See Mitigation** * HP Network Products - JH323A HPE 5130 24G 4SFP+ 1-slot HI Switch - JH324A HPE 5130 48G 4SFP+ 1-slot HI Switch - JH325A HPE 5130 24G PoE+ 4SFP+ 1-slot HI Switch - JH326A HPE 5130 48G PoE+ 4SFP+ 1-slot HI Switch + **5510HI - Version: See Mitigation** * HP Network Products - JH145A HPE 5510 24G 4SFP+ HI 1-slot Switch - JH146A HPE 5510 48G 4SFP+ HI 1-slot Switch - JH147A HPE 5510 24G PoE+ 4SFP+ HI 1-slot Switch - JH148A HPE 5510 48G PoE+ 4SFP+ HI 1-slot Switch - JH149A HPE 5510 24G SFP 4SFP+ HI 1-slot Switch + **5950 (Comware 7) - Version: See Mitigation** * HP Network Products - JH321A HPE FlexFabric 5950 32QSFP28 Switch + **5940 (Comware 7) - Version: See Mitigation** * HP Network Products - JH390A HPE FlexFabric 5940 48SFP+ 6QSFP28 Switch - JH391A HPE FlexFabric 5940 48XGT 6QSFP28 Switch - JH394A HPE FlexFabric 5940 48XGT 6QSFP+ Switch - JH395A HPE FlexFabric 5940 48SFP+ 6QSFP+ Switch - JH396A HPE FlexFabric 5940 32QSFP+ Switch - JH397A HPE FlexFabric 5940 2-slot Switch - JH398A HPE FlexFabric 5940 4-slot Switch + **12900E - Version: See Mitigation** * HP Network Products - JG619A HP FlexFabric 12910 Switch AC Chassis - JG621A HP FlexFabric 12910 Main Processing Unit - JG632A HP FlexFabric 12916 Switch AC Chassis - JG634A HP FlexFabric 12916 Main Processing Unit - JH104A HP FlexFabric 12900E Main Processing Unit - JH114A HP FlexFabric 12910 TAA-compliant Main Processing Unit - JH263A HP FlexFabric 12904E Main Processing Unit - JH255A HP FlexFabric 12908E Switch Chassis - JH262A HP FlexFabric 12904E Switch Chassis - JH113A HP FlexFabric 12910 TAA-compliant Switch AC Chassis - JH103A HP FlexFabric 12916E Switch Chassis HISTORY Version:1 (rev.1) - 23 November 2016 Initial release Third Party Security Patches: Third party security patches that are to be installed on systems running Hewlett Packard Enterprise (HPE) software products should be applied in accordance with the customer's patch management policy. Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HPE Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hpe.com. Report: To report a potential security vulnerability for any HPE supported product: Web form: https://www.hpe.com/info/report-security-vulnerability Email: security-alert@hpe.com Subscribe: To initiate a subscription to receive future HPE Security Bulletin alerts via Email: http://www.hpe.com/support/Subscriber_Choice Security Bulletin Archive: A list of recently released Security Bulletins is available here: http://www.hpe.com/support/Security_Bulletin_Archive Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB. 3C = 3COM 3P = 3rd Party Software GN = HPE General Software HF = HPE Hardware and Firmware MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PV = ProCurve ST = Storage Software UX = HP-UX Copyright 2016 Hewlett Packard Enterprise Hewlett Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett Packard Enterprise and the names of Hewlett Packard Enterprise products referenced herein are trademarks of Hewlett Packard Enterprise in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security and enhancement update Advisory ID: RHSA-2016:2128-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-2128.html Issue date: 2016-10-31 CVE Names: CVE-2016-4470 CVE-2016-5195 ===================================================================== 1. Summary: An update for kernel is now available for Red Hat Enterprise Linux 6.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux HPC Node EUS (v. 6.6) - noarch, x86_64 Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6) - x86_64 Red Hat Enterprise Linux Server EUS (v. 6.6) - i386, noarch, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional EUS (v. 6.6) - i386, ppc64, s390x, x86_64 3. Security Fix(es): * A flaw was found in the Linux kernel's keyring handling code: the key_reject_and_link() function could be forced to free an arbitrary memory block. An attacker could use this flaw to trigger a use-after-free condition on the system, potentially allowing for privilege escalation. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important) Red Hat would like to thank Phil Oester for reporting CVE-2016-5195. The CVE-2016-4470 issue was discovered by David Howells (Red Hat). Enhancement(s): * This update fixes a tape write problem by fixing the use of the sas_is_tlr_enabled API in the mpt3sas driver. The driver now checks whether Transport Layer Recovery (TLR) is enabled before enabling the MPI2_SCSIIO_CONTROL_TLR_ON flag. (BZ#1372352) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1341716 - CVE-2016-4470 kernel: Uninitialized variable in request_key handling causes kernel crash in error handling path 1384344 - CVE-2016-5195 kernel: mm: privilege escalation via MAP_PRIVATE COW breakage 6. Package List: Red Hat Enterprise Linux HPC Node EUS (v. 6.6): Source: kernel-2.6.32-504.54.1.el6.src.rpm noarch: kernel-abi-whitelists-2.6.32-504.54.1.el6.noarch.rpm kernel-doc-2.6.32-504.54.1.el6.noarch.rpm kernel-firmware-2.6.32-504.54.1.el6.noarch.rpm x86_64: kernel-2.6.32-504.54.1.el6.x86_64.rpm kernel-debug-2.6.32-504.54.1.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-504.54.1.el6.i686.rpm kernel-debug-debuginfo-2.6.32-504.54.1.el6.x86_64.rpm kernel-debug-devel-2.6.32-504.54.1.el6.i686.rpm kernel-debug-devel-2.6.32-504.54.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-504.54.1.el6.i686.rpm kernel-debuginfo-2.6.32-504.54.1.el6.x86_64.rpm kernel-debuginfo-common-i686-2.6.32-504.54.1.el6.i686.rpm kernel-debuginfo-common-x86_64-2.6.32-504.54.1.el6.x86_64.rpm kernel-devel-2.6.32-504.54.1.el6.x86_64.rpm kernel-headers-2.6.32-504.54.1.el6.x86_64.rpm perf-2.6.32-504.54.1.el6.x86_64.rpm perf-debuginfo-2.6.32-504.54.1.el6.i686.rpm perf-debuginfo-2.6.32-504.54.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-504.54.1.el6.i686.rpm python-perf-debuginfo-2.6.32-504.54.1.el6.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6): x86_64: kernel-debug-debuginfo-2.6.32-504.54.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-504.54.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-504.54.1.el6.x86_64.rpm perf-debuginfo-2.6.32-504.54.1.el6.x86_64.rpm python-perf-2.6.32-504.54.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-504.54.1.el6.x86_64.rpm Red Hat Enterprise Linux Server EUS (v. 6.6): Source: kernel-2.6.32-504.54.1.el6.src.rpm i386: kernel-2.6.32-504.54.1.el6.i686.rpm kernel-debug-2.6.32-504.54.1.el6.i686.rpm kernel-debug-debuginfo-2.6.32-504.54.1.el6.i686.rpm kernel-debug-devel-2.6.32-504.54.1.el6.i686.rpm kernel-debuginfo-2.6.32-504.54.1.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-504.54.1.el6.i686.rpm kernel-devel-2.6.32-504.54.1.el6.i686.rpm kernel-headers-2.6.32-504.54.1.el6.i686.rpm perf-2.6.32-504.54.1.el6.i686.rpm perf-debuginfo-2.6.32-504.54.1.el6.i686.rpm python-perf-debuginfo-2.6.32-504.54.1.el6.i686.rpm noarch: kernel-abi-whitelists-2.6.32-504.54.1.el6.noarch.rpm kernel-doc-2.6.32-504.54.1.el6.noarch.rpm kernel-firmware-2.6.32-504.54.1.el6.noarch.rpm ppc64: kernel-2.6.32-504.54.1.el6.ppc64.rpm kernel-bootwrapper-2.6.32-504.54.1.el6.ppc64.rpm kernel-debug-2.6.32-504.54.1.el6.ppc64.rpm kernel-debug-debuginfo-2.6.32-504.54.1.el6.ppc64.rpm kernel-debug-devel-2.6.32-504.54.1.el6.ppc64.rpm kernel-debuginfo-2.6.32-504.54.1.el6.ppc64.rpm kernel-debuginfo-common-ppc64-2.6.32-504.54.1.el6.ppc64.rpm kernel-devel-2.6.32-504.54.1.el6.ppc64.rpm kernel-headers-2.6.32-504.54.1.el6.ppc64.rpm perf-2.6.32-504.54.1.el6.ppc64.rpm perf-debuginfo-2.6.32-504.54.1.el6.ppc64.rpm python-perf-debuginfo-2.6.32-504.54.1.el6.ppc64.rpm s390x: kernel-2.6.32-504.54.1.el6.s390x.rpm kernel-debug-2.6.32-504.54.1.el6.s390x.rpm kernel-debug-debuginfo-2.6.32-504.54.1.el6.s390x.rpm kernel-debug-devel-2.6.32-504.54.1.el6.s390x.rpm kernel-debuginfo-2.6.32-504.54.1.el6.s390x.rpm kernel-debuginfo-common-s390x-2.6.32-504.54.1.el6.s390x.rpm kernel-devel-2.6.32-504.54.1.el6.s390x.rpm kernel-headers-2.6.32-504.54.1.el6.s390x.rpm kernel-kdump-2.6.32-504.54.1.el6.s390x.rpm kernel-kdump-debuginfo-2.6.32-504.54.1.el6.s390x.rpm kernel-kdump-devel-2.6.32-504.54.1.el6.s390x.rpm perf-2.6.32-504.54.1.el6.s390x.rpm perf-debuginfo-2.6.32-504.54.1.el6.s390x.rpm python-perf-debuginfo-2.6.32-504.54.1.el6.s390x.rpm x86_64: kernel-2.6.32-504.54.1.el6.x86_64.rpm kernel-debug-2.6.32-504.54.1.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-504.54.1.el6.i686.rpm kernel-debug-debuginfo-2.6.32-504.54.1.el6.x86_64.rpm kernel-debug-devel-2.6.32-504.54.1.el6.i686.rpm kernel-debug-devel-2.6.32-504.54.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-504.54.1.el6.i686.rpm kernel-debuginfo-2.6.32-504.54.1.el6.x86_64.rpm kernel-debuginfo-common-i686-2.6.32-504.54.1.el6.i686.rpm kernel-debuginfo-common-x86_64-2.6.32-504.54.1.el6.x86_64.rpm kernel-devel-2.6.32-504.54.1.el6.x86_64.rpm kernel-headers-2.6.32-504.54.1.el6.x86_64.rpm perf-2.6.32-504.54.1.el6.x86_64.rpm perf-debuginfo-2.6.32-504.54.1.el6.i686.rpm perf-debuginfo-2.6.32-504.54.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-504.54.1.el6.i686.rpm python-perf-debuginfo-2.6.32-504.54.1.el6.x86_64.rpm Red Hat Enterprise Linux Server Optional EUS (v. 6.6): i386: kernel-debug-debuginfo-2.6.32-504.54.1.el6.i686.rpm kernel-debuginfo-2.6.32-504.54.1.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-504.54.1.el6.i686.rpm perf-debuginfo-2.6.32-504.54.1.el6.i686.rpm python-perf-2.6.32-504.54.1.el6.i686.rpm python-perf-debuginfo-2.6.32-504.54.1.el6.i686.rpm ppc64: kernel-debug-debuginfo-2.6.32-504.54.1.el6.ppc64.rpm kernel-debuginfo-2.6.32-504.54.1.el6.ppc64.rpm kernel-debuginfo-common-ppc64-2.6.32-504.54.1.el6.ppc64.rpm perf-debuginfo-2.6.32-504.54.1.el6.ppc64.rpm python-perf-2.6.32-504.54.1.el6.ppc64.rpm python-perf-debuginfo-2.6.32-504.54.1.el6.ppc64.rpm s390x: kernel-debug-debuginfo-2.6.32-504.54.1.el6.s390x.rpm kernel-debuginfo-2.6.32-504.54.1.el6.s390x.rpm kernel-debuginfo-common-s390x-2.6.32-504.54.1.el6.s390x.rpm kernel-kdump-debuginfo-2.6.32-504.54.1.el6.s390x.rpm perf-debuginfo-2.6.32-504.54.1.el6.s390x.rpm python-perf-2.6.32-504.54.1.el6.s390x.rpm python-perf-debuginfo-2.6.32-504.54.1.el6.s390x.rpm x86_64: kernel-debug-debuginfo-2.6.32-504.54.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-504.54.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-504.54.1.el6.x86_64.rpm perf-debuginfo-2.6.32-504.54.1.el6.x86_64.rpm python-perf-2.6.32-504.54.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-504.54.1.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-4470 https://access.redhat.com/security/cve/CVE-2016-5195 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/security/vulnerabilities/2706661 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFYF2w0XlSAg2UNWIIRAs1OAJ4h8FSGzSaeomKDN+fI/36nv67vrACfUcEU 2ROTnOK9MbVf58A3skQGi2k= =2ew+ -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 2.07

sources: NVD: CVE-2016-5195 // BID: 93793 // VULMON: CVE-2016-5195 // PACKETSTORM: 139248 // PACKETSTORM: 180356 // PACKETSTORM: 142975 // PACKETSTORM: 139342 // PACKETSTORM: 139335 // PACKETSTORM: 139437 // PACKETSTORM: 142151 // PACKETSTORM: 139959 // PACKETSTORM: 139439

AFFECTED PRODUCTS

vendor:redhatmodel:enterprise linuxscope:eqversion:5

Trust: 1.3

vendor:redhatmodel:enterprise linuxscope:eqversion:6.0

Trust: 1.0

vendor:netappmodel:solidfirescope:eqversion: -

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:14.04

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:3.10.104

Trust: 1.0

vendor:redhatmodel:enterprise linux eusscope:eqversion:6.6

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:4.1.35

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:8.0

Trust: 1.0

vendor:redhatmodel:enterprise linux ausscope:eqversion:6.2

Trust: 1.0

vendor:redhatmodel:enterprise linux ausscope:eqversion:6.4

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:24

Trust: 1.0

vendor:netappmodel:oncommand performance managerscope:eqversion: -

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:3.18.44

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:4.5

Trust: 1.0

vendor:redhatmodel:enterprise linux tusscope:eqversion:6.5

Trust: 1.0

vendor:redhatmodel:enterprise linux eusscope:eqversion:6.7

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:16.10

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:3.13

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:7.0

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:23

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:3.4.113

Trust: 1.0

vendor:netappmodel:cloud backupscope:eqversion: -

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:3.12.66

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:3.17

Trust: 1.0

vendor:netappmodel:oncommand unified manager for clustered data ontapscope:eqversion: -

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:3.5

Trust: 1.0

vendor:redhatmodel:enterprise linuxscope:eqversion:7.0

Trust: 1.0

vendor:netappmodel:hci storage nodesscope:eqversion: -

Trust: 1.0

vendor:netappmodel:oncommand balancescope:eqversion: -

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:3.2.83

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:3.16.38

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:16.04

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:4.4.26

Trust: 1.0

vendor:redhatmodel:enterprise linux long lifescope:eqversion:5.6

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:3.3

Trust: 1.0

vendor:redhatmodel:enterprise linux long lifescope:eqversion:5.9

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:3.11

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:25

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:12.04

Trust: 1.0

vendor:netappmodel:ontap select deploy administration utilityscope:eqversion: -

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:3.19

Trust: 1.0

vendor:redhatmodel:enterprise linux eusscope:eqversion:7.1

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:2.6.22

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:4.8

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:4.7.9

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:4.2

Trust: 1.0

vendor:netappmodel:snapprotectscope:eqversion: -

Trust: 1.0

vendor:redhatmodel:enterprise linux ausscope:eqversion:6.5

Trust: 1.0

vendor:paloaltonetworksmodel:pan-osscope:ltversion:7.0.14

Trust: 1.0

vendor:paloaltonetworksmodel:pan-osscope:ltversion:7.1.8

Trust: 1.0

vendor:paloaltonetworksmodel:pan-osscope:gteversion:5.1

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:4.8.3

Trust: 1.0

vendor:paloaltonetworksmodel:pan-osscope:gteversion:7.1.0

Trust: 1.0

vendor:ciscomodel:paging serverscope:eqversion:0

Trust: 0.6

vendor:paloaltonetworksmodel:pan-osscope:eqversion:5.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.62

Trust: 0.3

vendor:hpmodel:msr95xscope:eqversion:0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:0.9.110.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.24.6

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.114

Trust: 0.3

vendor:ibmmodel:security guardiumscope:eqversion:9.1

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.11

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.15

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.117

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.31.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:32.0.1700.95

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.22

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.0.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.112

Trust: 0.3

vendor:huaweimodel:cloudengine v200r001sph002scope:neversion:8800

Trust: 0.3

vendor:hpmodel:(comware r2122scope:eqversion:79007)

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.46

Trust: 0.3

vendor:vmwaremodel:identity managerscope:eqversion:2.0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.52

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.28.4

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:eqversion:7.6

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.89

Trust: 0.3

vendor:ciscomodel:video surveillance media serverscope:eqversion:0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.12

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.36

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.34.13

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.16

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.80

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.155

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.15

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.39

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.38.3

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.14

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.11.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.7.4

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:1.5.1.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.26.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.16

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:1.5.1.131

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.36

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:6

Trust: 0.3

vendor:hpmodel:(comwarescope:eqversion:59507)0

Trust: 0.3

vendor:ibmmodel:powerkvmscope:eqversion:3.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.25

Trust: 0.3

vendor:ciscomodel:ip interoperability and collaboration systemscope:eqversion:0

Trust: 0.3

vendor:huaweimodel:cloudengine v100r005c00scope:eqversion:7800

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.80

Trust: 0.3

vendor:hpmodel:5130ei (comwarescope:eqversion:7)0

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.13

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.12

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.0.10

Trust: 0.3

vendor:ciscomodel:edge digital media playerscope:eqversion:3400

Trust: 0.3

vendor:redhatmodel:enterprise linux client optionalscope:eqversion:7

Trust: 0.3

vendor:huaweimodel:cloudengine v100r003c10scope:eqversion:12800

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.4

Trust: 0.3

vendor:redhatmodel:enterprise linux workstationscope:eqversion:7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18.2

Trust: 0.3

vendor:huaweimodel:cloudengine v100r002c00scope:eqversion:12800

Trust: 0.3

vendor:cloudmodel:linux cloudlinuxosscope:eqversion:7

Trust: 0.3

vendor:hpmodel:12900escope:eqversion:0

Trust: 0.3

vendor:linuxmodel:kernel 3.19-rc7scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.7

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.6.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.34.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.31.6

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.27

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.170

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:neversion:7.0.14

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.38.2

Trust: 0.3

vendor:hpmodel:6127xlgscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:jabber guestscope:eqversion:0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.65

Trust: 0.3

vendor:ciscomodel:vds recorderscope:eqversion:0

Trust: 0.3

vendor:vmwaremodel:vrealize operationsscope:eqversion:6.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.25.4

Trust: 0.3

vendor:huaweimodel:cloudengine v200r001c00scope:eqversion:12800

Trust: 0.3

vendor:ciscomodel:visual quality experience serverscope:eqversion:0

Trust: 0.3

vendor:debianmodel:linux sparcscope:eqversion:6.0

Trust: 0.3

vendor:junipermodel:junos space 15.1f2scope: - version: -

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.24.4

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.32

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:neversion:7.1.8

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:eqversion:7.6.2

Trust: 0.3

vendor:linuxmodel:kernel 4.4-rc1scope: - version: -

Trust: 0.3

vendor:vmwaremodel:vrealize automationscope:eqversion:6.0

Trust: 0.3

vendor:virtuozzomodel:containers for linuxscope:eqversion:4.7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.24.3

Trust: 0.3

vendor:ubuntumodel:linuxscope:eqversion:16.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.45

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.42

Trust: 0.3

vendor:huaweimodel:ar3200 v200r006c15scope: - version: -

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.31

Trust: 0.3

vendor:coreosmodel:linuxscope:eqversion:1164.1

Trust: 0.3

vendor:hpmodel:helion cloudsystemscope:eqversion:8.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.5

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.121

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.88

Trust: 0.3

vendor:linuxmodel:kernel 4.1-rc6scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.48

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.3

Trust: 0.3

vendor:huaweimodel:cloudengine v100r006c00scope:eqversion:8800

Trust: 0.3

vendor:vmwaremodel:vrealize operationsscope:eqversion:6.3.0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.8

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.31

Trust: 0.3

vendor:hpmodel:(comwarescope:eqversion:59307)0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.120

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.63-2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.7.9

Trust: 0.3

vendor:susemodel:linux enterprise server sp2 ltssscope:eqversion:11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.22

Trust: 0.3

vendor:hpmodel:msr3000 (comwarescope:eqversion:7)0

Trust: 0.3

vendor:hpmodel:msr2000 (comwarescope:eqversion:7)0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.10

Trust: 0.3

vendor:redhatmodel:enterprise linux hpc node eusscope:eqversion:7.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.7.3

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.38

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.35.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.34

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:2.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.1.15

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.49

Trust: 0.3

vendor:redhatmodel:enterprise linux clientscope:eqversion:7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13.11

Trust: 0.3

vendor:junipermodel:junos space 15.1r2.11scope: - version: -

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:8.0.552.342

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.4

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.53

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.38.6

Trust: 0.3

vendor:ciscomodel:scosscope:eqversion:0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18.3

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.48

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.57

Trust: 0.3

vendor:linuxmodel:kernel 4.1-rc1scope: - version: -

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.48

Trust: 0.3

vendor:coreosmodel:linuxscope:neversion:1192.0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.37

Trust: 0.3

vendor:linuxmodel:kernel 3.14-rc4scope: - version: -

Trust: 0.3

vendor:coreosmodel:linuxscope:eqversion:1164.0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.8.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.4

Trust: 0.3

vendor:ibmmodel:security guardiumscope:eqversion:9.5

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.16

Trust: 0.3

vendor:redhatmodel:enterprise linux hpc node eusscope:eqversion:7.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.2.3

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.49

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.11

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.0.6

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.13

Trust: 0.3

vendor:mcafeemodel:email gateway 7.6.2h968406scope: - version: -

Trust: 0.3

vendor:vmwaremodel:vrealize automationscope:eqversion:6.2

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.1.4

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.66

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.6.8

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.49

Trust: 0.3

vendor:ciscomodel:common services platform collectorscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:vds-tv streamerscope:eqversion:0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.31

Trust: 0.3

vendor:hpmodel:5510hiscope:eqversion:0

Trust: 0.3

vendor:hpmodel:6125xlgscope:eqversion:0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13.7

Trust: 0.3

vendor:googlemodel:pixel xlscope:eqversion:0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.124

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.17

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.9.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.0.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.169

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.34

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.2

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.47

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.14

Trust: 0.3

vendor:cloudmodel:linux cloudlinuxosscope:eqversion:6.0

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:eqversion:7.6.405

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:9

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.26

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18.22

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.25.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.54

Trust: 0.3

vendor:huaweimodel:cloudengine v100r005c10scope:eqversion:6800

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.2

Trust: 0.3

vendor:huaweimodel:ar3200 v200r008c20spc700scope:neversion: -

Trust: 0.3

vendor:susemodel:linux enterprise server 11-extrascope: - version: -

Trust: 0.3

vendor:ibmmodel:security guardiumscope:eqversion:9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.6.11

Trust: 0.3

vendor:linuxmodel:kernel 3.19-rcscope: - version: -

Trust: 0.3

vendor:susemodel:linux enterprise module for public cloudscope:eqversion:12

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.18

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.27.54

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.21

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.22

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.87

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.16.6

Trust: 0.3

vendor:ibmmodel:security guardiumscope:eqversion:10

Trust: 0.3

vendor:vmwaremodel:vrealize automationscope:eqversion:7.0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.46

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.17

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.12

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.81

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.90

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.99

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.168

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.11.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.2

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.0.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.53

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.33

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.9

Trust: 0.3

vendor:hpmodel:(comwarescope:eqversion:75007)0

Trust: 0.3

vendor:junipermodel:junos spacescope:eqversion:12.3

Trust: 0.3

vendor:hpmodel:propelscope:eqversion:2.20

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.41

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:2.5.0.997

Trust: 0.3

vendor:ciscomodel:prime network change and configuration managementscope:eqversion:0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.71

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.16

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:0.9.128.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.67

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.40

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.30

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.26

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.65

Trust: 0.3

vendor:ciscomodel:ucs directorscope:eqversion:0

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.0.5

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.70

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.17

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:5.1.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.37

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.6

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.0.12

Trust: 0.3

vendor:junipermodel:junos space 15.2r1scope: - version: -

Trust: 0.3

vendor:hpmodel:(comwarescope:eqversion:105007)0

Trust: 0.3

vendor:linuxmodel:kernel 4.4-rc4scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.15

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.7.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.22

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14-4

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.81

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.27.26

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.23

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.110

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.28

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.3.5

Trust: 0.3

vendor:linuxmodel:kernel 3.9-rc3scope: - version: -

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.108

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.17.2

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.95

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.8

Trust: 0.3

vendor:debianmodel:linux ia-64scope:eqversion:6.0

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:6.2

Trust: 0.3

vendor:ibmmodel:powerkvmscope:eqversion:2.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.19

Trust: 0.3

vendor:hpmodel:(comwarescope:eqversion:129007)0

Trust: 0.3

vendor:ciscomodel:unified communications managerscope:eqversion: -

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.0.1

Trust: 0.3

vendor:linuxmodel:kernel 3.13-rc1scope: - version: -

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.45

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.29

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.62

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.5

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.116

Trust: 0.3

vendor:hpmodel:msr1000 (comwarescope:eqversion:7)0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.6.7

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.17

Trust: 0.3

vendor:coreosmodel:linuxscope:eqversion:1192.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.67

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.17

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.62

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.115

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.6.2

Trust: 0.3

vendor:ciscomodel:videoscape distribution suite service managerscope:eqversion:0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.2.8

Trust: 0.3

vendor:hpmodel:helion cloudsystemscope:eqversion:8.1.2

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.14

Trust: 0.3

vendor:ciscomodel:dx series ip phonesscope:eqversion:0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.5.4

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.56

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.33

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.76

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.12

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.39

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.1

Trust: 0.3

vendor:redhatmodel:enterprise linux desktopscope:eqversion:7

Trust: 0.3

vendor:linuxmodel:kernel 3.9-rc8scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.25.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.2

Trust: 0.3

vendor:hpmodel:(comwarescope:eqversion:79007)0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.78

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.28

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:35.0.1916.155

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.38

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.2

Trust: 0.3

vendor:vmwaremodel:vrealize operations 6.2.0ascope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.24

Trust: 0.3

vendor:huaweimodel:cloudengine v100r006c00scope:eqversion:6800

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.57

Trust: 0.3

vendor:linuxmodel:kernelscope:neversion:4.7.9

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.88

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.7.7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.44

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.27

Trust: 0.3

vendor:susemodel:linux enterprise desktop sp1scope:eqversion:12

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.82

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.15

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.0.70

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:eqversion:7.6.404

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.1.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.51

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.9

Trust: 0.3

vendor:huaweimodel:cloudengine v100r005c10scope:eqversion:12800

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:8.0.552.344

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.13

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.55

Trust: 0.3

vendor:ciscomodel:spa122 analog telephone adapter with routerscope:eqversion:0

Trust: 0.3

vendor:linuxmodel:kernel 3.8-rc1scope: - version: -

Trust: 0.3

vendor:virtuozzomodel:virtuozzoscope:eqversion:6.0

Trust: 0.3

vendor:ciscomodel:connected grid routersscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:security guardiumscope:eqversion:10.0.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.5.2

Trust: 0.3

vendor:huaweimodel:cloudengine v100r003c10scope:eqversion:7800

Trust: 0.3

vendor:susemodel:linux enterprise point of sale 11-sp3scope: - version: -

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.72

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18.8

Trust: 0.3

vendor:susemodel:linux enterprise server 12-ltssscope: - version: -

Trust: 0.3

vendor:googlemodel:androidscope:eqversion:0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.17

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.21

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:eqversion:7.6.401

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.81

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.14

Trust: 0.3

vendor:susemodel:linux enterprise software development kit sp1scope:eqversion:12

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:37.0.2062.119

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.54

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.123

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.50

Trust: 0.3

vendor:redhatmodel:enterprise linux server ausscope:eqversion:7.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.37

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.3.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.3.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.25.2

Trust: 0.3

vendor:googlemodel:android onescope:eqversion:0

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.0.4

Trust: 0.3

vendor:mcafeemodel:email gateway 7.6.405h1165239scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.15.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.16.36

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.59

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.5.3

Trust: 0.3

vendor:huaweimodel:cloudengine v200r001c00scope:eqversion:7800

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.12

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.50

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.8.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.11

Trust: 0.3

vendor:linuxmodel:kernel 3.19-rc2scope: - version: -

Trust: 0.3

vendor:ciscomodel:series digital media playersscope:eqversion:44000

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:7

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.113

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.60

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.35

Trust: 0.3

vendor:ciscomodel:ata series analog terminal adaptorsscope:eqversion:1900

Trust: 0.3

vendor:susemodel:linux enterprise server sp3 ltssscope:eqversion:11

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.40

Trust: 0.3

vendor:debianmodel:linux amd64scope:eqversion:6.0

Trust: 0.3

vendor:susemodel:linux enterprise server for sapscope:eqversion:12

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.34.14

Trust: 0.3

vendor:huaweimodel:cloudengine v200r001c00scope:eqversion:8800

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.48

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.18

Trust: 0.3

vendor:hpmodel:(comwarescope:eqversion:59007)0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.41

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.72

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.0.12

Trust: 0.3

vendor:ciscomodel:unified communications manager session management editionscope:eqversion:0

Trust: 0.3

vendor:redhatmodel:enterprise linux mrgscope:eqversion:2

Trust: 0.3

vendor:ubuntumodel:linux lts amd64scope:eqversion:12.04

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.32

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.6

Trust: 0.3

vendor:ibmmodel:security guardiumscope:eqversion:10.1.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.75

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.24

Trust: 0.3

vendor:cloudmodel:linux cloudlinuxosscope:eqversion:5.0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.66

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:1.5(.1.131)

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.8

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.23

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.32

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.2

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.38

Trust: 0.3

vendor:ubuntumodel:linux ltsscope:eqversion:12.04

Trust: 0.3

vendor:junipermodel:junos spacescope:eqversion:13.3

Trust: 0.3

vendor:debianmodel:linux mipsscope:eqversion:6.0

Trust: 0.3

vendor:coreosmodel:linuxscope:eqversion:1153.4

Trust: 0.3

vendor:ciscomodel:prime access registrarscope:eqversion:0

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:eqversion:7.6.3.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.62

Trust: 0.3

vendor:coreosmodel:linuxscope:neversion:1122.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.64

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.63

Trust: 0.3

vendor:hpmodel:moonshotscope:eqversion:0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:48.0.2564.116

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:5.1.11

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.37

Trust: 0.3

vendor:junipermodel:junos space 15.2r2scope: - version: -

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.53

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.7

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:1.0

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.1.1

Trust: 0.3

vendor:ubuntumodel:linux ltsscope:eqversion:16.04

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.93

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.7

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.1

Trust: 0.3

vendor:ciscomodel:onepk all-in-one virtual machinescope:eqversion:0

Trust: 0.3

vendor:susemodel:linux enterprise debuginfo sp4scope:eqversion:11

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.61

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.5.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.41

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:28.0.1500.71

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:eqversion:7.6.1

Trust: 0.3

vendor:susemodel:linux enterprise workstation extension sp1scope:eqversion:12

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.6

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:5x

Trust: 0.3

vendor:linuxmodel:kernel 3.9-rc7scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.27.51

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.11.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.57

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.27.49

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.15.5

Trust: 0.3

vendor:huaweimodel:fusioncube v100r002c60spc100scope:neversion: -

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:28.0.1500.95

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.21

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:2.6.1.30

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14.7

Trust: 0.3

vendor:ciscomodel:vds-tv vaultscope:eqversion:0

Trust: 0.3

vendor:huaweimodel:cloudengine v100r006c00scope:eqversion:12800

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.31

Trust: 0.3

vendor:linuxmodel:kernel 3.11-rc7scope: - version: -

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.40

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.35.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.7.8

Trust: 0.3

vendor:coreosmodel:linuxscope:eqversion:1153.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.9

Trust: 0.3

vendor:hpmodel:hsr6600 (comwarescope:eqversion:7)0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1183.0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.13

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.0.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.23.14

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.39

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.18

Trust: 0.3

vendor:ciscomodel:spa232d multi-line dect analog telephone adapterscope:eqversion:0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.11

Trust: 0.3

vendor:googlemodel:chrome osscope:neversion:54.0.2840.79

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.37

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.5

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.171

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.73

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.57

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.79

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.19

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:5.1.13

Trust: 0.3

vendor:hpmodel:helion cloudsystemscope:eqversion:9.0.1

Trust: 0.3

vendor:ibmmodel:security guardiumscope:eqversion:10.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.34.2

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.73

Trust: 0.3

vendor:ciscomodel:dcm series d990x digital content managerscope:eqversion:0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14-1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.156

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.1

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:5.1.10

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.56

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.2

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.3

Trust: 0.3

vendor:opensusemodel:leapscope:eqversion:42.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.30.3

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.64

Trust: 0.3

vendor:hpmodel:(comwarescope:eqversion:57007)0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.58

Trust: 0.3

vendor:coreosmodel:linuxscope:eqversion:1192.2

Trust: 0.3

vendor:redhatmodel:enterprise linux server eusscope:eqversion:7.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.33

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.54

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.7.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.23

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.56

Trust: 0.3

vendor:junipermodel:junos space 14.1r1.9scope: - version: -

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.0.13

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.14

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.154

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.17

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.25

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.6

Trust: 0.3

vendor:susemodel:linux enterprise server sp1scope:eqversion:12

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.5

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.172

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.30

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.13

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.9

Trust: 0.3

vendor:huaweimodel:cloudengine v100r003c00scope:eqversion:6800

Trust: 0.3

vendor:huaweimodel:cloudengine v200r001sph002scope:neversion:6800

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.0.14

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.15

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.43

Trust: 0.3

vendor:vmwaremodel:vrealize operationsscope:eqversion:6.1.0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.35.13

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:33.0.1750.152

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:5.1.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.18

Trust: 0.3

vendor:linuxmodel:kernel 3.11-rc1scope: - version: -

Trust: 0.3

vendor:vmwaremodel:identity managerscope:eqversion:2.7

Trust: 0.3

vendor:hpmodel:helion cloudsystemscope:eqversion:8.1.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.61

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.43

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.1

Trust: 0.3

vendor:redhatmodel:enterprise linux server eusscope:eqversion:7.2

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.0.8

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:eqversion:7.6.403

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.26

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.44

Trust: 0.3

vendor:linuxmodel:kernel 4.4-rc5scope: - version: -

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.10

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:2.6

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.0

Trust: 0.3

vendor:hpmodel:vsr (comwarescope:eqversion:7)0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18.17

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.35

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.152

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.73

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.55

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.27

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.65

Trust: 0.3

vendor:huaweimodel:ar3200 v200r006c13scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernel 3.0-rc1scope: - version: -

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:1.1

Trust: 0.3

vendor:hpmodel:(comwarescope:eqversion:59207)0

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.1.7

Trust: 0.3

vendor:ciscomodel:smart net total care onpremscope:eqversion:-0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.54

Trust: 0.3

vendor:virtuozzomodel:update hotfixscope:neversion:6.011

Trust: 0.3

vendor:huaweimodel:cloudengine v100r005c00scope:eqversion:6800

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.5.7

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.18

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.22

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.11

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:1.5

Trust: 0.3

vendor:ibmmodel:powerkvm updatescope:neversion:2.1.1.3-6513

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:2.0

Trust: 0.3

vendor:ciscomodel:spa112 2-port phone adapterscope:eqversion:0

Trust: 0.3

vendor:junipermodel:junos space 16.1r1scope:neversion: -

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.161

Trust: 0.3

vendor:vmwaremodel:vrealize operationsscope:eqversion:6.0.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.9.8

Trust: 0.3

vendor:huaweimodel:fusioncube v100r002c60rc1scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.42

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.1.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.30

Trust: 0.3

vendor:huaweimodel:ar3200 v200r006c12scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.38.4

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.32

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.23

Trust: 0.3

vendor:ciscomodel:telepresence video communication serverscope:eqversion:0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.43

Trust: 0.3

vendor:hpmodel:hsr6800 (comwarescope:eqversion:7)0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:23.0.1271.94

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:6

Trust: 0.3

vendor:ibmmodel:powerkvm updatescope:neversion:3.1.0.23

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.3.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.3

Trust: 0.3

vendor:centosmodel:centosscope:eqversion:7

Trust: 0.3

vendor:coreosmodel:linuxscope:eqversion:1185.0

Trust: 0.3

vendor:susemodel:manager proxyscope:eqversion:2.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18.9

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:2.5.1.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.41

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.91

Trust: 0.3

vendor:ubuntumodel:linux ltsscope:eqversion:14.04

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.26

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.46

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.0.13

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.6.4

Trust: 0.3

vendor:linuxmodel:kernel 3.7-rc1scope: - version: -

Trust: 0.3

vendor:huaweimodel:cloudengine v100r005c10scope:eqversion:7800

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.31

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.18

Trust: 0.3

vendor:ubuntumodel:linux lts i386scope:eqversion:12.04

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.4

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.19

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:5.1.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.39

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.17.4

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:0.10.140.0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14.5

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:eqversion:7.6.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.58

Trust: 0.3

vendor:hpmodel:propelscope:eqversion:2.01

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.28

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.8

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:0.9.134.14

Trust: 0.3

vendor:ciscomodel:ata analog telephone adaptorscope:eqversion:1870

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.29

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.10

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.1.2

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.76

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:13.1

Trust: 0.3

vendor:ciscomodel:expressway seriesscope:eqversion:0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.21

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.12

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.1

Trust: 0.3

vendor:junipermodel:junos spacescope:eqversion:12.1

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:eqversion:7.6.3.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.15

Trust: 0.3

vendor:ibmmodel:security guardiumscope:eqversion:8.2

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.79

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.15

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.12

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.74

Trust: 0.3

vendor:redhatmodel:enterprise linux server ausscope:eqversion:6.5

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:0.9.131.0

Trust: 0.3

vendor:ciscomodel:edge digital media playerscope:eqversion:3000

Trust: 0.3

vendor:vmwaremodel:vrealize automationscope:eqversion:6.2.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.7

Trust: 0.3

vendor:vmwaremodel:vrealize automationscope:eqversion:6.2.4.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.63

Trust: 0.3

vendor:huaweimodel:ar3200 v200r007c00scope: - version: -

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.16.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.6

Trust: 0.3

vendor:huaweimodel:cloudengine v100r003c00scope:eqversion:12800

Trust: 0.3

vendor:huaweimodel:cloudengine v200r001sph002scope:neversion:12800

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.4.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.27

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.13

Trust: 0.3

vendor:debianmodel:linux s/390scope:eqversion:6.0

Trust: 0.3

vendor:ciscomodel:vds-tv caching nodesscope:eqversion:0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.5

Trust: 0.3

vendor:hpmodel:helion openstackscope:eqversion:4.0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.19

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.20

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.55

Trust: 0.3

vendor:susemodel:openstack cloudscope:eqversion:5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.72

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.12

Trust: 0.3

vendor:hpmodel:helion openstackscope:neversion:4.0.1

Trust: 0.3

vendor:huaweimodel:ar3200 v200r006c10scope: - version: -

Trust: 0.3

vendor:ciscomodel:series digital media playersscope:eqversion:43000

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.7.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.16

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.82

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18.7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.16.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.6.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.38

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.55

Trust: 0.3

vendor:susemodel:linux enterprise server sp4scope:eqversion:11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.37.2

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.1.5

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.90

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.25

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.52

Trust: 0.3

vendor:linuxmodel:kernelscope:neversion:4.8.3

Trust: 0.3

vendor:coreosmodel:linuxscope:neversion:1185.2

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.16

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.1.8

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:1.5(.1.6)

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.0

Trust: 0.3

vendor:linuxmodel:kernel 3.14-rc7scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18.11

Trust: 0.3

vendor:linuxmodel:kernel 4.3-rc1scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.14

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.23.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:0.9.126.0

Trust: 0.3

vendor:linuxmodel:kernel 4.1-rc3scope: - version: -

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.1.3

Trust: 0.3

vendor:huaweimodel:cloudengine v100r005c00scope:eqversion:12800

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.6.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.25

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13.5

Trust: 0.3

vendor:hpmodel:propelscope:eqversion:1.01

Trust: 0.3

vendor:vmwaremodel:vrealize automationscope:eqversion:6.1

Trust: 0.3

vendor:virtuozzomodel:server bare metalscope:eqversion:5.0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.159

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14.4

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.68

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.20

Trust: 0.3

vendor:debianmodel:linux armscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.34

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.24

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.30

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.93

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.6.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.38

Trust: 0.3

vendor:ciscomodel:prime collaboration provisioningscope:eqversion:0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.50

Trust: 0.3

vendor:centosmodel:centosscope:eqversion:5

Trust: 0.3

vendor:ciscomodel:nexus series fabric switches aci modescope:eqversion:9000-0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.8

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.84

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.51

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.86

Trust: 0.3

vendor:huaweimodel:cloudengine v100r006c00scope:eqversion:7800

Trust: 0.3

vendor:redhatmodel:enterprise linux serverscope:eqversion:7

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.173

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.29

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.34

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.4

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.7

Trust: 0.3

vendor:coreosmodel:linuxscope:eqversion:1185.1

Trust: 0.3

vendor:susemodel:managerscope:eqversion:2.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.21

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.34

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13.0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.45

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.44

Trust: 0.3

vendor:hpmodel:helion openstackscope:eqversion:3.0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.16.7

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.16

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14.37

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:3.1.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14.54

Trust: 0.3

vendor:hpmodel:5130hiscope:eqversion:0

Trust: 0.3

vendor:susemodel:linux enterprise debuginfo sp3scope:eqversion:11

Trust: 0.3

vendor:hpmodel:propelscope:eqversion:2.10

Trust: 0.3

vendor:hpmodel:helion cloudsystemscope:neversion:10.0.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.7.2

Trust: 0.3

vendor:googlemodel:nexus playerscope:eqversion:0

Trust: 0.3

vendor:redhatmodel:enterprise linuxscope:eqversion:6

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.20

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.126

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.60

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.16

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.27

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.15

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.6.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.78

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.49

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.8.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13.9

Trust: 0.3

vendor:googlemodel:pixel cscope:eqversion:0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.26

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.21

Trust: 0.3

vendor:ciscomodel:cloud object storagescope:eqversion:0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.19.3

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:5.1.4

Trust: 0.3

vendor:junipermodel:junos space 14.1r1scope: - version: -

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.8

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.20

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.5.6

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:eqversion:7.6.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.2

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:2.7

Trust: 0.3

vendor:linuxmodel:kernel 4.1-rc7scope: - version: -

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.18

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.118

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.75

Trust: 0.3

vendor:susemodel:linux enterprise live patchingscope:eqversion:12

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.58

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.15

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.44

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.0.15

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.2

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.70

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.52

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.7.5

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.31

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.50

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.72

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:5.1.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.8.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.87

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.35

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.81

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:neversion:6.1.17

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.92

Trust: 0.3

vendor:ciscomodel:application policy infrastructure controllerscope:eqversion:0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.37

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.10

Trust: 0.3

vendor:hpmodel:(comwarescope:eqversion:19507)0

Trust: 0.3

vendor:hpmodel:(comwarescope:eqversion:125007)0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.36

Trust: 0.3

vendor:hpmodel:helion cloudsystemscope:eqversion:9.0.2

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.86

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.47

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.60

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.85

Trust: 0.3

vendor:huaweimodel:ar3200 v200r006c16scope: - version: -

Trust: 0.3

vendor:centosmodel:centosscope:eqversion:6

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.0

Trust: 0.3

vendor:linuxmodel:kernel 3.11-rc4scope: - version: -

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:40.0.2214.114

Trust: 0.3

vendor:redhatmodel:enterprise linuxscope:eqversion:7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.24

Trust: 0.3

vendor:hpmodel:helion openstackscope:neversion:3.0.3

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:53.0.2785.103

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.42

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.51

Trust: 0.3

vendor:vmwaremodel:vrealize automationscope:eqversion:7.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.56

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.23.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.3

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:8.0.552.343

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.14

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.17

Trust: 0.3

vendor:linuxmodel:kernelscope:neversion:4.4.26

Trust: 0.3

vendor:ciscomodel:webex meetings server 2.5mr2scope: - version: -

Trust: 0.3

vendor:huaweimodel:cloudengine v100r003c10scope:eqversion:6800

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.42

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.7

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.0.7

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:52.0.2743.85

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.125

Trust: 0.3

vendor:huaweimodel:cloudengine v100r002c00scope:eqversion:6800

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.11

Trust: 0.3

vendor:vmwaremodel:vrealize operationsscope:eqversion:6.2.1

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:eqversion:7.6.400

Trust: 0.3

vendor:junipermodel:junos spacescope:eqversion:1.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.20

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.19

Trust: 0.3

vendor:linuxmodel:kernel 3.17-rc3scope: - version: -

Trust: 0.3

vendor:hpmodel:(comwarescope:eqversion:59407)0

Trust: 0.3

vendor:ciscomodel:prime service catalog virtual appliancescope:eqversion:0

Trust: 0.3

vendor:hpmodel:propelscope:eqversion:1.11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.22

Trust: 0.3

vendor:googlemodel:pixelscope:eqversion:0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:48.0.2564.92

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.14

Trust: 0.3

vendor:debianmodel:linux ia-32scope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.52

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.0.11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.14

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.35.4

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.18

Trust: 0.3

vendor:coreosmodel:linuxscope:eqversion:1180.0

Trust: 0.3

vendor:ciscomodel:prime data center network managerscope:eqversion: -

Trust: 0.3

vendor:huaweimodel:cloudengine v200r001c00scope:eqversion:6800

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364160

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.51

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.28

Trust: 0.3

vendor:ciscomodel:mxe series media experience enginesscope:eqversion:35000

Trust: 0.3

vendor:googlemodel:nexus 6pscope: - version: -

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.3

Trust: 0.3

vendor:ciscomodel:videoscape distribution suite video recordingscope:eqversion:0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.31.4

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:53.0.2785.144

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.69

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14.45

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:5.1.12

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.7

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.36

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.8.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.8.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.8

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:neversion:7.6.406-3402.103

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.23

Trust: 0.3

vendor:ciscomodel:webex meetings server mr1scope:eqversion:2.5

Trust: 0.3

vendor:hpmodel:msr4000 (comwarescope:eqversion:7)0

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:2.5.99.2

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.29

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.122

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.35

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:5.1.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.36

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.47

Trust: 0.3

vendor:hpmodel:helion cloudsystemscope:eqversion:9.0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.6

Trust: 0.3

vendor:debianmodel:linux powerpcscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.77

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.98

Trust: 0.3

vendor:ciscomodel:visual quality experience tools serverscope:eqversion:0

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.00

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.119

Trust: 0.3

vendor:junipermodel:junos spacescope:eqversion:11.2

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.17

Trust: 0.3

vendor:mcafeemodel:email gateway 7.6.405h1157986scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.30.5

Trust: 0.3

vendor:redhatmodel:enterprise linux hpc nodescope:eqversion:7

Trust: 0.3

vendor:susemodel:linux enterprise software development kit sp4scope:eqversion:11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.17.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.30.4

Trust: 0.3

vendor:susemodel:linux enterprise debuginfo sp2scope:eqversion:11

Trust: 0.3

vendor:huaweimodel:ar3200 v200r008c20scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.5.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.6.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.34.3

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.98

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.3

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.1

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:eqversion:7.6.402

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.13

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.36

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.0.9

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.10

Trust: 0.3

vendor:huaweimodel:cloudengine v100r003c00scope:eqversion:7800

Trust: 0.3

vendor:hpmodel:(comware r3108p03scope:eqversion:51307)

Trust: 0.3

vendor:huaweimodel:cloudengine v200r001sph002scope:neversion:7800

Trust: 0.3

sources: BID: 93793 // NVD: CVE-2016-5195

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-5195
value: HIGH

Trust: 1.0

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2016-5195
value: HIGH

Trust: 1.0

VULMON: CVE-2016-5195
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2016-5195
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

nvd@nist.gov: CVE-2016-5195
baseSeverity: HIGH
baseScore: 7.0
vectorString: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: HIGH
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.0
impactScore: 5.9
version: 3.1

Trust: 2.0

sources: VULMON: CVE-2016-5195 // NVD: CVE-2016-5195 // NVD: CVE-2016-5195

PROBLEMTYPE DATA

problemtype:CWE-362

Trust: 1.0

sources: NVD: CVE-2016-5195

THREAT TYPE

local

Trust: 0.8

sources: BID: 93793 // PACKETSTORM: 139248 // PACKETSTORM: 139342 // PACKETSTORM: 139335 // PACKETSTORM: 139437 // PACKETSTORM: 142151

TYPE

Design Error

Trust: 0.3

sources: BID: 93793

EXPLOIT AVAILABILITY

sources: VULMON: CVE-2016-5195

PATCH

title:Red Hat: Important: kernel-rt security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20162110 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20162124 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security and enhancement updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20162128 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20162126 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20162106 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20162127 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20162120 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20162132 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20162118 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20162098 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20162105 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20162133 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel-rt security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20162107 - Security Advisory

Trust: 0.1

title:Ubuntu Security Notice: linux-snapdragon vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3106-4

Trust: 0.1

title:Ubuntu Security Notice: linux-raspi2 vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3107-2

Trust: 0.1

title:Ubuntu Security Notice: linux vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3107-1

Trust: 0.1

title:Ubuntu Security Notice: linux vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3104-1

Trust: 0.1

title:Ubuntu Security Notice: linux-raspi2 vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3106-3

Trust: 0.1

title:Ubuntu Security Notice: linux vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3105-1

Trust: 0.1

title:Ubuntu Security Notice: linux-lts-trusty vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3105-2

Trust: 0.1

title:Ubuntu Security Notice: linux-ti-omap4 vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3104-2

Trust: 0.1

title:Ubuntu Security Notice: linux vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3106-1

Trust: 0.1

title:Ubuntu Security Notice: linux-lts-xenial vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3106-2

Trust: 0.1

title:Cisco: Cisco TelePresence Video Communication Server Test Validation Script Issueurl:https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-20181107-vcsd

Trust: 0.1

title:dirty-cow-toolkiturl:https://github.com/roliboy/rootcow

Trust: 0.1

title: - url:https://github.com/yatt-ze/DirtyCowAndroid

Trust: 0.1

title:polaris-dict-a63-archurl:https://github.com/zaoqi/polaris-dict-a63-arch

Trust: 0.1

sources: VULMON: CVE-2016-5195

EXTERNAL IDS

db:NVDid:CVE-2016-5195

Trust: 2.3

db:CERT/CCid:VU#243144

Trust: 1.3

db:JUNIPERid:JSA10770

Trust: 1.3

db:BIDid:93793

Trust: 1.3

db:PACKETSTORMid:142151

Trust: 1.1

db:OPENWALLid:OSS-SECURITY/2016/10/30/1

Trust: 1.0

db:OPENWALLid:OSS-SECURITY/2022/08/09/4

Trust: 1.0

db:OPENWALLid:OSS-SECURITY/2022/08/08/8

Trust: 1.0

db:OPENWALLid:OSS-SECURITY/2016/10/27/13

Trust: 1.0

db:OPENWALLid:OSS-SECURITY/2016/10/21/1

Trust: 1.0

db:OPENWALLid:OSS-SECURITY/2016/10/26/7

Trust: 1.0

db:OPENWALLid:OSS-SECURITY/2022/08/08/7

Trust: 1.0

db:OPENWALLid:OSS-SECURITY/2022/08/15/1

Trust: 1.0

db:OPENWALLid:OSS-SECURITY/2022/08/08/1

Trust: 1.0

db:OPENWALLid:OSS-SECURITY/2022/03/07/1

Trust: 1.0

db:OPENWALLid:OSS-SECURITY/2022/08/08/2

Trust: 1.0

db:OPENWALLid:OSS-SECURITY/2016/11/03/7

Trust: 1.0

db:PACKETSTORMid:139923

Trust: 1.0

db:PACKETSTORMid:139922

Trust: 1.0

db:PACKETSTORMid:139277

Trust: 1.0

db:PACKETSTORMid:139286

Trust: 1.0

db:PACKETSTORMid:139287

Trust: 1.0

db:MCAFEEid:SB10222

Trust: 1.0

db:MCAFEEid:SB10177

Trust: 1.0

db:MCAFEEid:SB10176

Trust: 1.0

db:EXPLOIT-DBid:40616

Trust: 1.0

db:EXPLOIT-DBid:40847

Trust: 1.0

db:EXPLOIT-DBid:40611

Trust: 1.0

db:EXPLOIT-DBid:40839

Trust: 1.0

db:SECTRACKid:1037078

Trust: 1.0

db:JUNIPERid:JSA10774

Trust: 1.0

db:JUNIPERid:JSA10807

Trust: 1.0

db:VULMONid:CVE-2016-5195

Trust: 0.1

db:PACKETSTORMid:139248

Trust: 0.1

db:PACKETSTORMid:180356

Trust: 0.1

db:PACKETSTORMid:142975

Trust: 0.1

db:PACKETSTORMid:139342

Trust: 0.1

db:PACKETSTORMid:139335

Trust: 0.1

db:PACKETSTORMid:139437

Trust: 0.1

db:PACKETSTORMid:139959

Trust: 0.1

db:PACKETSTORMid:139439

Trust: 0.1

sources: VULMON: CVE-2016-5195 // BID: 93793 // PACKETSTORM: 139248 // PACKETSTORM: 180356 // PACKETSTORM: 142975 // PACKETSTORM: 139342 // PACKETSTORM: 139335 // PACKETSTORM: 139437 // PACKETSTORM: 142151 // PACKETSTORM: 139959 // PACKETSTORM: 139439 // NVD: CVE-2016-5195

REFERENCES

url:http://rhn.redhat.com/errata/rhsa-2016-2118.html

Trust: 1.4

url:https://access.redhat.com/security/vulnerabilities/2706661

Trust: 1.4

url:https://access.redhat.com/security/cve/cve-2016-5195

Trust: 1.4

url:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619

Trust: 1.3

url:https://bugzilla.redhat.com/show_bug.cgi?id=1384344

Trust: 1.3

url:https://source.android.com/security/bulletin/2016-12-01.html

Trust: 1.3

url:http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161207-01-dirtycow-en

Trust: 1.3

url:https://github.com/dirtycow/dirtycow.github.io/wiki/pocs

Trust: 1.3

url:http://rhn.redhat.com/errata/rhsa-2016-2120.html

Trust: 1.3

url:https://www.kb.cert.org/vuls/id/243144

Trust: 1.3

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20161026-linux

Trust: 1.3

url:https://github.com/dirtycow/dirtycow.github.io/wiki/vulnerabilitydetails

Trust: 1.3

url:http://www.ubuntu.com/usn/usn-3105-1

Trust: 1.1

url:http://rhn.redhat.com/errata/rhsa-2016-2106.html

Trust: 1.1

url:http://rhn.redhat.com/errata/rhsa-2016-2126.html

Trust: 1.1

url:http://rhn.redhat.com/errata/rhsa-2016-2128.html

Trust: 1.1

url:https://www.exploit-db.com/exploits/40611/

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00064.html

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00058.html

Trust: 1.0

url:https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-c05352241

Trust: 1.0

url:https://www.exploit-db.com/exploits/40847/

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00100.html

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00066.html

Trust: 1.0

url:https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-hpesbgn03742en_us

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00050.html

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00067.html

Trust: 1.0

url:https://security.netapp.com/advisory/ntap-20161025-0001/

Trust: 1.0

url:https://www.arista.com/en/support/advisories-notices/security-advisories/1753-security-advisory-0026

Trust: 1.0

url:http://www.ubuntu.com/usn/usn-3106-4

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00065.html

Trust: 1.0

url:https://dirtycow.ninja

Trust: 1.0

url:http://packetstormsecurity.com/files/142151/kernel-live-patch-security-notice-lsn-0021-1.html

Trust: 1.0

url:http://rhn.redhat.com/errata/rhsa-2016-2110.html

Trust: 1.0

url:https://people.canonical.com/~ubuntu-security/cve/2016/cve-2016-5195.html

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/w3aprvdvpdbxlh4dc5ukzvcr742mjim3/

Trust: 1.0

url:http://kb.juniper.net/infocenter/index?page=content&id=jsa10774

Trust: 1.0

url:http://www.securityfocus.com/archive/1/540252/100/0/threaded

Trust: 1.0

url:http://www.securitytracker.com/id/1037078

Trust: 1.0

url:http://www.debian.org/security/2016/dsa-3696

Trust: 1.0

url:http://rhn.redhat.com/errata/rhsa-2016-2124.html

Trust: 1.0

url:http://www.openwall.com/lists/oss-security/2016/11/03/7

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00055.html

Trust: 1.0

url:http://www.securityfocus.com/archive/1/archive/1/539611/100/0/threaded

Trust: 1.0

url:https://bto.bluecoat.com/security-advisory/sa134

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00034.html

Trust: 1.0

url:http://kb.juniper.net/infocenter/index?page=content&id=jsa10770

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00048.html

Trust: 1.0

url:https://security-tracker.debian.org/tracker/cve-2016-5195

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00056.html

Trust: 1.0

url:http://rhn.redhat.com/errata/rhsa-2016-2098.html

Trust: 1.0

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05352241

Trust: 1.0

url:https://www.exploit-db.com/exploits/40839/

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00039.html

Trust: 1.0

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05341463

Trust: 1.0

url:http://www.kernel.org/pub/linux/kernel/v4.x/changelog-4.8.3

Trust: 1.0

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05347541

Trust: 1.0

url:http://www.openwall.com/lists/oss-security/2022/08/08/1

Trust: 1.0

url:http://www.openwall.com/lists/oss-security/2016/10/27/13

Trust: 1.0

url:http://www.securityfocus.com/archive/1/539611/100/0/threaded

Trust: 1.0

url:http://www.openwall.com/lists/oss-security/2022/08/08/2

Trust: 1.0

url:http://www.securityfocus.com/archive/1/540736/100/0/threaded

Trust: 1.0

url:https://kc.mcafee.com/corporate/index?page=content&id=sb10177

Trust: 1.0

url:http://www.openwall.com/lists/oss-security/2016/10/30/1

Trust: 1.0

url:http://www.openwall.com/lists/oss-security/2022/08/09/4

Trust: 1.0

url:https://bugzilla.suse.com/show_bug.cgi?id=1004418

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/nwmdlbwmgzkfhmrj7quqvcerp5qhdb6w/

Trust: 1.0

url:http://packetstormsecurity.com/files/139923/linux-kernel-dirty-cow-ptrace_pokedata-privilege-escalation.html

Trust: 1.0

url:http://www.openwall.com/lists/oss-security/2022/08/08/7

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00040.html

Trust: 1.0

url:http://www.securityfocus.com/archive/1/archive/1/540344/100/0/threaded

Trust: 1.0

url:http://www.securityfocus.com/archive/1/540344/100/0/threaded

Trust: 1.0

url:http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html

Trust: 1.0

url:http://www.ubuntu.com/usn/usn-3106-2

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00054.html

Trust: 1.0

url:https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-hpesbgn03761en_us

Trust: 1.0

url:http://fortiguard.com/advisory/fg-ir-16-063

Trust: 1.0

url:http://kb.juniper.net/infocenter/index?page=content&id=jsa10807

Trust: 1.0

url:https://kc.mcafee.com/corporate/index?page=content&id=sb10176

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html

Trust: 1.0

url:http://www.ubuntu.com/usn/usn-3106-3

Trust: 1.0

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20181107-vcsd

Trust: 1.0

url:http://www.openwall.com/lists/oss-security/2022/03/07/1

Trust: 1.0

url:https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-hpesbgn03707en_us

Trust: 1.0

url:http://rhn.redhat.com/errata/rhsa-2016-2107.html

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00051.html

Trust: 1.0

url:https://source.android.com/security/bulletin/2016-11-01.html

Trust: 1.0

url:https://access.redhat.com/errata/rhsa-2017:0372

Trust: 1.0

url:https://github.com/torvalds/linux/commit/19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619

Trust: 1.0

url:https://security.paloaltonetworks.com/cve-2016-5195

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00033.html

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00072.html

Trust: 1.0

url:http://www.ubuntu.com/usn/usn-3104-2

Trust: 1.0

url:https://kc.mcafee.com/corporate/index?page=content&id=sb10222

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00049.html

Trust: 1.0

url:http://www.ubuntu.com/usn/usn-3107-1

Trust: 1.0

url:http://rhn.redhat.com/errata/rhsa-2016-2132.html

Trust: 1.0

url:http://www.openwall.com/lists/oss-security/2016/10/21/1

Trust: 1.0

url:http://www.securityfocus.com/bid/93793

Trust: 1.0

url:http://www.securityfocus.com/archive/1/archive/1/540252/100/0/threaded

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00053.html

Trust: 1.0

url:https://help.ecostruxureit.com/display/public/uadco8x/struxureware+data+center+operation+software+vulnerability+fixes

Trust: 1.0

url:http://www.openwall.com/lists/oss-security/2016/10/26/7

Trust: 1.0

url:http://www.ubuntu.com/usn/usn-3107-2

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00052.html

Trust: 1.0

url:http://packetstormsecurity.com/files/139277/kernel-live-patch-security-notice-lsn-0012-1.html

Trust: 1.0

url:http://rhn.redhat.com/errata/rhsa-2016-2127.html

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/e7m62srp6czlj4zxcrzkv4wplqbsr7dt/

Trust: 1.0

url:http://rhn.redhat.com/errata/rhsa-2016-2133.html

Trust: 1.0

url:http://www.ubuntu.com/usn/usn-3105-2

Trust: 1.0

url:http://www.securityfocus.com/archive/1/archive/1/540736/100/0/threaded

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00035.html

Trust: 1.0

url:http://www.ubuntu.com/usn/usn-3106-1

Trust: 1.0

url:http://www.openwall.com/lists/oss-security/2022/08/15/1

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00057.html

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00036.html

Trust: 1.0

url:http://rhn.redhat.com/errata/rhsa-2016-2105.html

Trust: 1.0

url:http://www.openwall.com/lists/oss-security/2022/08/08/8

Trust: 1.0

url:http://packetstormsecurity.com/files/139922/linux-kernel-dirty-cow-ptrace_pokedata-privilege-escalation.html

Trust: 1.0

url:http://packetstormsecurity.com/files/139287/dirtycow-local-root-proof-of-concept.html

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00045.html

Trust: 1.0

url:https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-hpesbgn03722en_us

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html

Trust: 1.0

url:https://www.exploit-db.com/exploits/40616/

Trust: 1.0

url:http://packetstormsecurity.com/files/139286/dirtycow-linux-kernel-race-condition.html

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00038.html

Trust: 1.0

url:http://www.ubuntu.com/usn/usn-3104-1

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2016-5195

Trust: 0.9

url:https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05341463

Trust: 0.4

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.4

url:https://access.redhat.com/articles/11258

Trust: 0.4

url:https://access.redhat.com/security/team/contact/

Trust: 0.4

url:https://bugzilla.redhat.com/):

Trust: 0.4

url:https://access.redhat.com/security/team/key/

Trust: 0.4

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.4

url:https://github.com/amluto/vulnerabilities/blob/master/others/cve-2016-5195/test_cve-2016-5195.c

Trust: 0.3

url:https://dirtycow.ninja/

Trust: 0.3

url:http://www.kernel.org/

Trust: 0.3

url:https://googlechromereleases.blogspot.in/2016/10/stable-channel-update-for-chrome-os_26.html

Trust: 0.3

url:https://kb.vmware.com/selfservice/microsites/search.do?language=en_us&cmd=displaykc&externalid=2147515

Trust: 0.3

url:https://kb.juniper.net/infocenter/index?page=content&id=jsa10770&actp=rss

Trust: 0.3

url:https://help.virtuozzo.com/customer/portal/articles/2613795

Trust: 0.3

url:https://help.virtuozzo.com/customer/portal/articles/2613794

Trust: 0.3

url:http://kb.odin.com/en/129683

Trust: 0.3

url:https://github.com/timwr/cve-2016-5195

Trust: 0.3

url:https://forum.proxmox.com/threads/cve-2016-5195-dirty-cow.29908/

Trust: 0.3

url:https://centos.org/forums/viewtopic.php?f=51&p=252514

Trust: 0.3

url:https://www.cloudlinux.com/kernelcare-blog/entry/dirty-cow-vulnerability-the-fix-is-coming

Trust: 0.3

url:https://security-tracker.debian.org/tracker/dla-670-1

Trust: 0.3

url:https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05347541

Trust: 0.3

url:https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05352241

Trust: 0.3

url:http://www.ibm.com/support/docview.wss?uid=isg3t1024478

Trust: 0.3

url:https://securityadvisories.paloaltonetworks.com/home/detail/73

Trust: 0.3

url:https://coreos.com/blog/cve-2016-5195.html

Trust: 0.3

url:https://git.kernel.org/cgit/linux/kernel/git/stable/linux-stable.git/commit/?id=9691eac5593ff1e2f82391ad327f21d90322aec1

Trust: 0.3

url:https://gryzli.info/2016/10/21/protect-cve-2016-5195-dirtycow-centos-7rhel7cpanelcloudlinux/

Trust: 0.3

url:https://kc.mcafee.com/resources/sites/mcafee/content/live/product_documentation/27000/pd27128/en_us/meg_7_6_406_3402_103_release_notes_en_us.pdf

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21995667

Trust: 0.3

url:https://www.ubuntu.com/usn/usn-3104-1/

Trust: 0.3

url:https://www.ubuntu.com/usn/usn-3105-1/

Trust: 0.3

url:https://www.ubuntu.com/usn/usn-3105-2/

Trust: 0.3

url:https://www.ubuntu.com/usn/usn-3106-1/

Trust: 0.3

url:https://www.ubuntu.com/usn/usn-3106-2/

Trust: 0.3

url:https://www.ubuntu.com/usn/usn-3106-3/

Trust: 0.3

url:https://www.ubuntu.com/usn/usn-3106-4/

Trust: 0.3

url:https://www.ubuntu.com/usn/usn-3107-1/

Trust: 0.3

url:https://help.virtuozzo.com/customer/en/portal/articles/2613793

Trust: 0.3

url:http://www.vmware.com/security/advisories/vmsa-2016-0018.html

Trust: 0.3

url:http://www.hpe.com/support/security_bulletin_archive

Trust: 0.2

url:https://www.hpe.com/info/report-security-vulnerability

Trust: 0.2

url:https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c01345499

Trust: 0.2

url:http://www.hpe.com/support/subscriber_choice

Trust: 0.2

url:https://launchpad.net/ubuntu/+source/linux/3.13.0-100.147

Trust: 0.1

url:https://www.swissphone.com/solutions/components/terminals/radio-data-module-dical-red/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-7406

Trust: 0.1

url:https://www.syss.de/fileadmin/dokumente/publikationen/advisories/syss-2024-041.txt

Trust: 0.1

url:https://www.syss.de/fileadmin/dokumente/pgpkeys/sebastian_hamann.asc

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-1281

Trust: 0.1

url:https://www.syss.de/en/responsible-disclosure-policy

Trust: 0.1

url:http://creativecommons.org/licenses/by/3.0/deed.en

Trust: 0.1

url:https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-hpesbgn03761en_us

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-8633

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-9555

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-7912

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-7916

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-7910

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-8630

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-2583

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-7911

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-8399

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-6074

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-9191

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-7308

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-9756

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-4470

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-4470

Trust: 0.1

sources: BID: 93793 // PACKETSTORM: 139248 // PACKETSTORM: 180356 // PACKETSTORM: 142975 // PACKETSTORM: 139342 // PACKETSTORM: 139335 // PACKETSTORM: 139437 // PACKETSTORM: 142151 // PACKETSTORM: 139959 // PACKETSTORM: 139439 // NVD: CVE-2016-5195

CREDITS

Red Hat

Trust: 0.4

sources: PACKETSTORM: 139342 // PACKETSTORM: 139335 // PACKETSTORM: 139437 // PACKETSTORM: 139439

SOURCES

db:VULMONid:CVE-2016-5195
db:BIDid:93793
db:PACKETSTORMid:139248
db:PACKETSTORMid:180356
db:PACKETSTORMid:142975
db:PACKETSTORMid:139342
db:PACKETSTORMid:139335
db:PACKETSTORMid:139437
db:PACKETSTORMid:142151
db:PACKETSTORMid:139959
db:PACKETSTORMid:139439
db:NVDid:CVE-2016-5195

LAST UPDATE DATE

2025-03-29T21:05:12.031000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2016-5195date:2023-11-07T00:00:00
db:BIDid:93793date:2017-12-19T22:37:00
db:NVDid:CVE-2016-5195date:2025-01-29T18:15:28.220

SOURCES RELEASE DATE

db:VULMONid:CVE-2016-5195date:2016-11-10T00:00:00
db:BIDid:93793date:2016-10-19T00:00:00
db:PACKETSTORMid:139248date:2016-10-20T15:37:02
db:PACKETSTORMid:180356date:2024-08-23T15:36:16
db:PACKETSTORMid:142975date:2017-06-16T14:19:52
db:PACKETSTORMid:139342date:2016-10-26T23:25:21
db:PACKETSTORMid:139335date:2016-10-26T14:02:58
db:PACKETSTORMid:139437date:2016-10-31T22:22:00
db:PACKETSTORMid:142151date:2017-04-15T00:38:07
db:PACKETSTORMid:139959date:2016-11-30T21:26:01
db:PACKETSTORMid:139439date:2016-10-31T22:24:00
db:NVDid:CVE-2016-5195date:2016-11-10T21:59:00.197