ID

VAR-201808-1002


CVE

CVE-2018-5390


TITLE

TCP implementations vulnerable to Denial of Service

Trust: 0.8

sources: CERT/CC: VU#962459

DESCRIPTION

Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service. Linux Kernel is prone to a remote denial-of-service vulnerability. An attacker can exploit this issue to cause a denial-of-service condition. Linux kernel 4.9 and later are vulnerable. 7) - aarch64, noarch, ppc64le 3. Security Fix(es): * An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load & Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-5391) Space precludes documenting all of the security fixes in this advisory. 1623067 - CVE-2018-9363 kernel: Buffer overflow in hidp_process_report 1629636 - CVE-2018-14641 kernel: a bug in ip_frag_reasm() can cause a crash in ip_do_fragment() 6. (BZ#1625330) 4. Bug Fix(es): * The kernel-rt packages have been upgraded to the 3.10.0-693.39.1 source tree, which provides a number of bug fixes over the previous version. (BZ#1616431) * Previously, preemption was enabled too early after a context switch. If a task was migrated to another CPU after a context switch, a mismatch between CPU and runqueue during load balancing sometimes occurred. Consequently, a runnable task on an idle CPU failed to run, and the operating system became unresponsive. As a result, CPU migration during post-schedule processing no longer occurs, which prevents the above mismatch. (BZ#1618466) 4. CVE-2018-13405 Jann Horn discovered that the inode_init_owner function in fs/inode.c in the Linux kernel allows local users to create files with an unintended group ownership allowing attackers to escalate privileges by making a plain file executable and SGID. For the stable distribution (stretch), these problems have been fixed in version 4.9.110-3+deb9u1. This update includes fixes for several regressions in the latest point release. For the detailed security status of linux please refer to its security tracker page at: https://security-tracker.debian.org/tracker/linux Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAltolY5fFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0T1cBAAhxrsiYuYMiQj9x+shNxxp6gWEXpDoOCwU0cXzZ2lii2uSPzP5TsIQey3 3nBjPCZthg8Q0fL2m0thbfS+i1HTT9tlJT7EjBGDjA0jm2o/lQCmH5rp8DDPtbwZ 2iZ9HyfosEFnbCd6VHtWIM3NoGZFUjvBWkb29/op800BqkHk69WchT1ZWSE8G85S NAwG7tf/mfWIc0nYgieFo9i2X2bk0mNUOjC8xnVnK2TZY5jzK7f9fmQzdPAglZaI t1UoQS4PMl6UTi7AJephorP6+6KJPg3n0rCgJYYXtnRO4PilSLveg7dNniKpCaDo jJKVIcug8Hqo1zc6Uk0tgdZBPILZULyMGr7XUJ97cyA6i+9xhDpGPmqH6pbWQ+YZ JplAY4PHZ2PUi+6is4LE7kYQfPk8+KvvshUB8Qr2Xa61GUDcgpdcaTmNmFYH3EAF St27o/Nbs8WsKNzkOMxtyva88YJr7RDHr+nX/I1fKlI8zC8k3gHYYtJ11QhCDWKT 1O42ppxxaBUMo5ns0ZCjNBaMFPTaKrDYocAzhVot94I2++8InhFWbAzRq7B44fKe E4Q6jDXY3x5MexSyZG3sGc6EwUtr/Gr8trB4TZkvNrQtZ9WBh28TOsldecGsncqw I62eV7vx701dQDjtcDy/yZlGDjFTULQkyX8GPL9hIBeRjCFRhrA= =h8it -----END PGP SIGNATURE----- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2018:2776-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2018:2776 Issue date: 2018-09-25 CVE Names: CVE-2018-5390 ==================================================================== 1. Summary: An update for kernel is now available for Red Hat Enterprise Linux 7.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux ComputeNode EUS (v. 7.4) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4) - x86_64 Red Hat Enterprise Linux Server EUS (v. 7.4) - noarch, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional EUS (v. 7.4) - ppc64, ppc64le, x86_64 3. Security Fix(es): * A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390) Red Hat would like to thank Juha-Matti Tilli (Aalto University - Department of Communications and Networking and Nokia Bell Labs) for reporting this issue. Bug Fix(es): * Previously, making the total buffer size bigger than the memory size for early allocation through the trace_buf_size boot option, made the system become unresponsive at the boot stage. This update introduces a change in the early memory allocation. As a result, the system no longer hangs in the above described scenario. (BZ#1588365) * When inserting objects with the same keys, made the rhlist implementation corrupt the chain pointers. As a consequence, elements were missing on removal and traversal. This patch updates the chain pointers correctly. As a result, there are no missing elements on removal and traversal in the above-described scenario. (BZ#1601008) * Previously, the kernel source code was missing support to report the Speculative Store Bypass Disable (SSBD) vulnerability status on IBM Power Systems and the little-endian variants of IBM Power Systems. As a consequence, the /sys/devices/system/cpu/vulnerabilities/spec_store_bypass file incorrectly reported "Not affected" on both CPU architectures. This fix updates the kernel source code to properly report the SSBD status either as "Vulnerable" or "Mitigation: Kernel entry/exit barrier (TYPE)" where TYPE is one of "eieio", "hwsync", "fallback", or "unknown". (BZ#1612352) * Previously, the early microcode updater in the kernel was trying to perform a microcode update on virtualized guests. As a consequence, the virtualized guests sometimes mishandled the request to perform the microcode update and became unresponsive in the early boot stage. This update applies an upstream patch to avoid the early microcode update when running under a hypervisor. As a result, no kernel freezes appear in the described scenario. (BZ#1618389) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1601704 - CVE-2018-5390 kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack) 6. Package List: Red Hat Enterprise Linux ComputeNode EUS (v. 7.4): Source: kernel-3.10.0-693.39.1.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-693.39.1.el7.noarch.rpm kernel-doc-3.10.0-693.39.1.el7.noarch.rpm x86_64: kernel-3.10.0-693.39.1.el7.x86_64.rpm kernel-debug-3.10.0-693.39.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-693.39.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-693.39.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-693.39.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-693.39.1.el7.x86_64.rpm kernel-devel-3.10.0-693.39.1.el7.x86_64.rpm kernel-headers-3.10.0-693.39.1.el7.x86_64.rpm kernel-tools-3.10.0-693.39.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-693.39.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-693.39.1.el7.x86_64.rpm perf-3.10.0-693.39.1.el7.x86_64.rpm perf-debuginfo-3.10.0-693.39.1.el7.x86_64.rpm python-perf-3.10.0-693.39.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-693.39.1.el7.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4): x86_64: kernel-debug-debuginfo-3.10.0-693.39.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-693.39.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-693.39.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-693.39.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-693.39.1.el7.x86_64.rpm perf-debuginfo-3.10.0-693.39.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-693.39.1.el7.x86_64.rpm Red Hat Enterprise Linux Server EUS (v. 7.4): Source: kernel-3.10.0-693.39.1.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-693.39.1.el7.noarch.rpm kernel-doc-3.10.0-693.39.1.el7.noarch.rpm ppc64: kernel-3.10.0-693.39.1.el7.ppc64.rpm kernel-bootwrapper-3.10.0-693.39.1.el7.ppc64.rpm kernel-debug-3.10.0-693.39.1.el7.ppc64.rpm kernel-debug-debuginfo-3.10.0-693.39.1.el7.ppc64.rpm kernel-debug-devel-3.10.0-693.39.1.el7.ppc64.rpm kernel-debuginfo-3.10.0-693.39.1.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-693.39.1.el7.ppc64.rpm kernel-devel-3.10.0-693.39.1.el7.ppc64.rpm kernel-headers-3.10.0-693.39.1.el7.ppc64.rpm kernel-tools-3.10.0-693.39.1.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-693.39.1.el7.ppc64.rpm kernel-tools-libs-3.10.0-693.39.1.el7.ppc64.rpm perf-3.10.0-693.39.1.el7.ppc64.rpm perf-debuginfo-3.10.0-693.39.1.el7.ppc64.rpm python-perf-3.10.0-693.39.1.el7.ppc64.rpm python-perf-debuginfo-3.10.0-693.39.1.el7.ppc64.rpm ppc64le: kernel-3.10.0-693.39.1.el7.ppc64le.rpm kernel-bootwrapper-3.10.0-693.39.1.el7.ppc64le.rpm kernel-debug-3.10.0-693.39.1.el7.ppc64le.rpm kernel-debug-debuginfo-3.10.0-693.39.1.el7.ppc64le.rpm kernel-debuginfo-3.10.0-693.39.1.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-693.39.1.el7.ppc64le.rpm kernel-devel-3.10.0-693.39.1.el7.ppc64le.rpm kernel-headers-3.10.0-693.39.1.el7.ppc64le.rpm kernel-tools-3.10.0-693.39.1.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-693.39.1.el7.ppc64le.rpm kernel-tools-libs-3.10.0-693.39.1.el7.ppc64le.rpm perf-3.10.0-693.39.1.el7.ppc64le.rpm perf-debuginfo-3.10.0-693.39.1.el7.ppc64le.rpm python-perf-3.10.0-693.39.1.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-693.39.1.el7.ppc64le.rpm s390x: kernel-3.10.0-693.39.1.el7.s390x.rpm kernel-debug-3.10.0-693.39.1.el7.s390x.rpm kernel-debug-debuginfo-3.10.0-693.39.1.el7.s390x.rpm kernel-debug-devel-3.10.0-693.39.1.el7.s390x.rpm kernel-debuginfo-3.10.0-693.39.1.el7.s390x.rpm kernel-debuginfo-common-s390x-3.10.0-693.39.1.el7.s390x.rpm kernel-devel-3.10.0-693.39.1.el7.s390x.rpm kernel-headers-3.10.0-693.39.1.el7.s390x.rpm kernel-kdump-3.10.0-693.39.1.el7.s390x.rpm kernel-kdump-debuginfo-3.10.0-693.39.1.el7.s390x.rpm kernel-kdump-devel-3.10.0-693.39.1.el7.s390x.rpm perf-3.10.0-693.39.1.el7.s390x.rpm perf-debuginfo-3.10.0-693.39.1.el7.s390x.rpm python-perf-3.10.0-693.39.1.el7.s390x.rpm python-perf-debuginfo-3.10.0-693.39.1.el7.s390x.rpm x86_64: kernel-3.10.0-693.39.1.el7.x86_64.rpm kernel-debug-3.10.0-693.39.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-693.39.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-693.39.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-693.39.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-693.39.1.el7.x86_64.rpm kernel-devel-3.10.0-693.39.1.el7.x86_64.rpm kernel-headers-3.10.0-693.39.1.el7.x86_64.rpm kernel-tools-3.10.0-693.39.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-693.39.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-693.39.1.el7.x86_64.rpm perf-3.10.0-693.39.1.el7.x86_64.rpm perf-debuginfo-3.10.0-693.39.1.el7.x86_64.rpm python-perf-3.10.0-693.39.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-693.39.1.el7.x86_64.rpm Red Hat Enterprise Linux Server Optional EUS (v. 7.4): ppc64: kernel-debug-debuginfo-3.10.0-693.39.1.el7.ppc64.rpm kernel-debuginfo-3.10.0-693.39.1.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-693.39.1.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-693.39.1.el7.ppc64.rpm kernel-tools-libs-devel-3.10.0-693.39.1.el7.ppc64.rpm perf-debuginfo-3.10.0-693.39.1.el7.ppc64.rpm python-perf-debuginfo-3.10.0-693.39.1.el7.ppc64.rpm ppc64le: kernel-debug-debuginfo-3.10.0-693.39.1.el7.ppc64le.rpm kernel-debug-devel-3.10.0-693.39.1.el7.ppc64le.rpm kernel-debuginfo-3.10.0-693.39.1.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-693.39.1.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-693.39.1.el7.ppc64le.rpm kernel-tools-libs-devel-3.10.0-693.39.1.el7.ppc64le.rpm perf-debuginfo-3.10.0-693.39.1.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-693.39.1.el7.ppc64le.rpm x86_64: kernel-debug-debuginfo-3.10.0-693.39.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-693.39.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-693.39.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-693.39.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-693.39.1.el7.x86_64.rpm perf-debuginfo-3.10.0-693.39.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-693.39.1.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2018-5390 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2018 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBW6qe0NzjgjWX9erEAQifnQ//Yjt7BtzIu5kCLW7RctFFx62Ny8fJUuZ0 sLah6bMbzFmLPMvHLyrOY7W532MtFMuObhzumKzSlprP0eGYNmlz9XAxTrYD63bQ RRBHqyT0cjFYxRrtJx4S7oriE3x2jRmrcRFlmlN8Bl18XO+fieihrOH547AmXlrl eb/n0g//94pEfXiIbh9UWOqCw5jWTpk0R46Tl/i+ky4SrysGDDd1SzWP8+hnE+ps BSDZD6ubYM2T7qunnYZ0Ci7LbfMxFNtLedZvG9dO8Ywlqfif5RNNFXfXp7WvYRzb RBzcrSX+FdtY/XCn7ov3WkH32kadtx2Q7vvrA/eLdwYt+6BaGKMmU7yc+zOIsZpA 2uJUO7AYm3p9J4SW4hpxmuw3er4g+bSHGuXg8Nz6kWVyWrMzILAXQYDUDwI66rTy EZXbRaOJCFY3+vYSHKAcZRHnroSOsIq/EotegjqFN4fcSVMSNNlOeoRop7pr3kQq eWlpbaDcWiE7CA5camN4aO0doj25vIdIyT4E8B+QBP7AC5FcF94CpQkyb2htut5o 0usFXhzZSze2MxeECwIf74/1QrF+kcgcLbwBJw/k0COoJ0qLTnEOsAjMJNNR4+0N JrZ2SQAwYs/QbIGVJTGvyfVhNYnnr+EW5/nrBiZU6DokA3q6rEI/Tg4Q8OIx0wwX j4HjKybGYpU:wj -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . 6.5) - x86_64 3. Bug Fix(es): * Previously, invalid headers in the sk_buff struct led to an indefinite loop in the tcp_collapse() function. As a consequence, the system became unresponsive. (BZ#1629632) 4. 6.6) - noarch, x86_64 3. (CVE-2018-5391) * kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact (CVE-2018-10675) * kernel: Integer overflow in Linux's create_elf_tables function (CVE-2018-14634) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * After updating the system to prevent the L1 Terminal Fault (L1TF) vulnerability, only one thread was detected on systems that offer processing of two threads on a single processor core. With this update, the "__max_smt_threads()" function has been fixed. (BZ#1625334) * Previously, a kernel panic occurred when the kernel tried to make an out of bound access to the array that describes the L1 Terminal Fault (L1TF) mitigation state on systems without Extended Page Tables (EPT) support. This update extends the array of mitigation states to cover all the states, which effectively prevents out of bound array access. Also, this update enables rejecting invalid, irrelevant values, that might be erroneously provided by the userspace. (BZ#1629633) 4. ========================================================================= Ubuntu Security Notice USN-3741-2 August 14, 2018 linux-lts-xenial, linux-aws vulnerabilities ========================================================================= A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 14.04 LTS Summary: Several security issues were fixed in the Linux kernel. This update provides the corresponding updates for the Linux Hardware Enablement (HWE) kernel from Ubuntu 16.04 LTS for Ubuntu 14.04 LTS. It was discovered that memory present in the L1 data cache of an Intel CPU core may be exposed to a malicious process that is executing on the CPU core. This vulnerability is also known as L1 Terminal Fault (L1TF). A local attacker in a guest virtual machine could use this to expose sensitive information (memory from other guests or the host OS). (CVE-2018-3646) It was discovered that memory present in the L1 data cache of an Intel CPU core may be exposed to a malicious process that is executing on the CPU core. This vulnerability is also known as L1 Terminal Fault (L1TF). A local attacker could use this to expose sensitive information (memory from the kernel or other processes). (CVE-2018-5391) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 14.04 LTS: linux-image-4.4.0-1027-aws 4.4.0-1027.30 linux-image-4.4.0-133-generic 4.4.0-133.159~14.04.1 linux-image-4.4.0-133-generic-lpae 4.4.0-133.159~14.04.1 linux-image-4.4.0-133-lowlatency 4.4.0-133.159~14.04.1 linux-image-4.4.0-133-powerpc-e500mc 4.4.0-133.159~14.04.1 linux-image-4.4.0-133-powerpc-smp 4.4.0-133.159~14.04.1 linux-image-4.4.0-133-powerpc64-emb 4.4.0-133.159~14.04.1 linux-image-4.4.0-133-powerpc64-smp 4.4.0-133.159~14.04.1 linux-image-aws 4.4.0.1027.27 linux-image-generic-lpae-lts-xenial 4.4.0.133.113 linux-image-generic-lts-xenial 4.4.0.133.113 linux-image-lowlatency-lts-xenial 4.4.0.133.113 linux-image-powerpc-e500mc-lts-xenial 4.4.0.133.113 linux-image-powerpc-smp-lts-xenial 4.4.0.133.113 linux-image-powerpc64-emb-lts-xenial 4.4.0.133.113 linux-image-powerpc64-smp-lts-xenial 4.4.0.133.113 Please note that the recommended mitigation for CVE-2018-3646 involves updating processor microcode in addition to updating the kernel; however, the kernel includes a fallback for processors that have not received microcode updates. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well

Trust: 2.88

sources: NVD: CVE-2018-5390 // CERT/CC: VU#962459 // BID: 104976 // VULHUB: VHN-135421 // PACKETSTORM: 149310 // PACKETSTORM: 148850 // PACKETSTORM: 150070 // PACKETSTORM: 149543 // PACKETSTORM: 149542 // PACKETSTORM: 148839 // PACKETSTORM: 149545 // PACKETSTORM: 149830 // PACKETSTORM: 149826 // PACKETSTORM: 148916

AFFECTED PRODUCTS

vendor:f5model:big-ip application acceleration managerscope:lteversion:11.6.3

Trust: 1.0

vendor:f5model:big-ip application security managerscope:lteversion:11.6.3

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:lteversion:12.1.3

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:gteversion:11.5.1

Trust: 1.0

vendor:f5model:big-ip link controllerscope:lteversion:12.1.3

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:lteversion:12.1.3

Trust: 1.0

vendor:ciscomodel:telepresence video communication serverscope:eqversion:x8.10

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:gteversion:12.1.0

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:7.2

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:lteversion:13.1.1

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:eqversion:14.0.0

Trust: 1.0

vendor:redhatmodel:enterprise linux serverscope:eqversion:7.0

Trust: 1.0

vendor:ciscomodel:telepresence video communication serverscope:eqversion:x8.11

Trust: 1.0

vendor:f5model:big-ip link controllerscope:lteversion:13.1.1

Trust: 1.0

vendor:f5model:big-ip analyticsscope:lteversion:12.1.3

Trust: 1.0

vendor:redhatmodel:enterprise linux workstationscope:eqversion:7.0

Trust: 1.0

vendor:redhatmodel:enterprise linux server tusscope:eqversion:7.2

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:lteversion:13.1.1

Trust: 1.0

vendor:redhatmodel:enterprise linux server eusscope:eqversion:7.2

Trust: 1.0

vendor:f5model:big-ip analyticsscope:gteversion:13.0.0

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:lteversion:12.1.3

Trust: 1.0

vendor:ciscomodel:expresswayscope:eqversion:x8.10.3

Trust: 1.0

vendor:hpmodel:aruba clearpass policy managerscope:gteversion:6.7.0

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:lteversion:12.1.3

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:gteversion:12.1.0

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:7.4

Trust: 1.0

vendor:ciscomodel:telepresence conductorscope:eqversion:xc4.3

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:14.04

Trust: 1.0

vendor:redhatmodel:enterprise linux server tusscope:eqversion:7.3

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:gteversion:12.0.0

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:4.18

Trust: 1.0

vendor:redhatmodel:enterprise linux server eusscope:eqversion:7.5

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:6.6

Trust: 1.0

vendor:redhatmodel:enterprise linux server eusscope:eqversion:7.3

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:gtversion:13.0.0

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:9.0

Trust: 1.0

vendor:hpmodel:aruba clearpass policy managerscope:gteversion:6.6.0

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:gteversion:13.0.0

Trust: 1.0

vendor:ciscomodel:telepresence conductorscope:eqversion:xc4.3.4

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:gteversion:11.5.1

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:8.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:lteversion:12.1.3

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:gteversion:13.0.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:16.04

Trust: 1.0

vendor:ciscomodel:webex hybrid data securityscope:eqversion: -

Trust: 1.0

vendor:redhatmodel:enterprise linux server tusscope:eqversion:6.6

Trust: 1.0

vendor:f5model:big-ip application security managerscope:gteversion:11.5.1

Trust: 1.0

vendor:ciscomodel:telepresence conductorscope:eqversion:xc4.3.2

Trust: 1.0

vendor:f5model:big-ip application security managerscope:eqversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:gteversion:13.0.0

Trust: 1.0

vendor:a10networksmodel:advanced core operating systemscope:eqversion:3.2.2

Trust: 1.0

vendor:ciscomodel:expresswayscope:eqversion:x8.11

Trust: 1.0

vendor:f5model:big-ip analyticsscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:lteversion:11.6.3

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:lteversion:12.1.3

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:lteversion:11.6.3

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:lteversion:13.1.1

Trust: 1.0

vendor:hpmodel:aruba clearpass policy managerscope:lteversion:6.6.9

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:eqversion:14.0.0

Trust: 1.0

vendor:hpmodel:aruba clearpass policy managerscope:lteversion:6.7.5

Trust: 1.0

vendor:f5model:big-ip analyticsscope:lteversion:11.6.3

Trust: 1.0

vendor:redhatmodel:enterprise linux desktopscope:eqversion:7.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:lteversion:13.1.1

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:eqversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:lteversion:13.1.1

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:gteversion:13.0.0

Trust: 1.0

vendor:ciscomodel:telepresence video communication serverscope:eqversion:x8.10.4

Trust: 1.0

vendor:ciscomodel:meeting managementscope:eqversion:1.0

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:lteversion:11.6.3

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:7.3

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:gteversion:11.5.1

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:lteversion:11.6.3

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:gteversion:11.5.1

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:gteversion:12.1.0

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:6.4

Trust: 1.0

vendor:ciscomodel:webex video meshscope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:lteversion:13.1.1

Trust: 1.0

vendor:f5model:big-ip application security managerscope:lteversion:13.1.1

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:eqversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:eqversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:eqversion:14.0.0

Trust: 1.0

vendor:ciscomodel:telepresence video communication serverscope:eqversion:x8.10.1

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:lteversion:12.1.3

Trust: 1.0

vendor:redhatmodel:enterprise linux server eusscope:eqversion:6.4

Trust: 1.0

vendor:ciscomodel:telepresence conductorscope:eqversion:xc4.3.1

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:lteversion:11.6.3

Trust: 1.0

vendor:f5model:big-ip link controllerscope:lteversion:11.6.3

Trust: 1.0

vendor:f5model:traffix systems signaling delivery controllerscope:lteversion:5.1.0

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:traffix systems signaling delivery controllerscope:eqversion:4.4.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:lteversion:12.1.3

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:gteversion:11.5.1

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:lteversion:12.1.3

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:lteversion:11.6.3

Trust: 1.0

vendor:redhatmodel:virtualizationscope:eqversion:4.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:eqversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:gteversion:11.5.1.

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:12.04

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:gteversion:13.0.0

Trust: 1.0

vendor:f5model:big-ip link controllerscope:gteversion:11.5.1

Trust: 1.0

vendor:f5model:big-ip link controllerscope:eqversion:14.0.0

Trust: 1.0

vendor:f5model:traffix systems signaling delivery controllerscope:gteversion:5.0.0

Trust: 1.0

vendor:ciscomodel:expresswayscope:eqversion:x8.10.4

Trust: 1.0

vendor:f5model:big-ip application security managerscope:gteversion:13.0.0

Trust: 1.0

vendor:ciscomodel:expressway seriesscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:meeting managementscope:eqversion:1.0.1

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:lteversion:12.1.3

Trust: 1.0

vendor:f5model:big-ip application security managerscope:lteversion:12.1.3

Trust: 1.0

vendor:ciscomodel:telepresence video communication serverscope:eqversion:x8.10.2

Trust: 1.0

vendor:ciscomodel:digital network architecture centerscope:eqversion:1.2

Trust: 1.0

vendor:f5model:big-ip analyticsscope:eqversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:gteversion:11.5.1

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:gteversion:13.0.0

Trust: 1.0

vendor:ciscomodel:network assurance enginescope:eqversion:2.1\(1a\)

Trust: 1.0

vendor:ciscomodel:expresswayscope:eqversion:x8.10.1

Trust: 1.0

vendor:f5model:big-ip link controllerscope:gteversion:13.0.0

Trust: 1.0

vendor:ciscomodel:threat grid-cloudscope:eqversion: -

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:6.5

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:lteversion:13.1.1

Trust: 1.0

vendor:a10networksmodel:advanced core operating systemscope:eqversion:4.1.4

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:18.04

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:lteversion:13.1.1

Trust: 1.0

vendor:a10networksmodel:advanced core operating systemscope:eqversion:4.1.1

Trust: 1.0

vendor:hpmodel:aruba airwave ampscope:ltversion:8.2.7.1

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:gteversion:13.0.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:gteversion:11.5.1

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:lteversion:11.6.3

Trust: 1.0

vendor:ciscomodel:telepresence conductorscope:eqversion:xc4.3.3

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:gteversion:13.0.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:gteversion:12.1.0

Trust: 1.0

vendor:linuxmodel:kernelscope:eqversion:4.18

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:gteversion:11.5.1

Trust: 1.0

vendor:f5model:big-ip analyticsscope:lteversion:13.1.1

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:gteversion:11.5.1

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:lteversion:11.6.3

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:4.9

Trust: 1.0

vendor:ciscomodel:telepresence video communication serverscope:eqversion:x8.10.3

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:eqversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:lteversion:11.6.3

Trust: 1.0

vendor:a10networksmodel:advanced core operating systemscope:eqversion:4.1.0

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:gteversion:12.1.0

Trust: 1.0

vendor:a10networksmodel:advanced core operating systemscope:eqversion:4.1.2

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:lteversion:13.1.1

Trust: 1.0

vendor:ciscomodel:expresswayscope:eqversion:x8.10.2

Trust: 1.0

vendor:redhatmodel:enterprise linux server tusscope:eqversion:7.4

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:lteversion:13.1.1

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:eqversion:14.0.0

Trust: 1.0

vendor:ciscomodel:collaboration meeting roomsscope:eqversion:1.0

Trust: 1.0

vendor:redhatmodel:enterprise linux server eusscope:eqversion:7.4

Trust: 1.0

vendor:f5model:big-ip link controllerscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:eqversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:gteversion:13.0.0

Trust: 1.0

vendor:redhatmodel:enterprise linux server eusscope:eqversion:6.7

Trust: 1.0

vendor:f5model:big-ip analyticsscope:gteversion:11.5.1

Trust: 1.0

vendor:ciscomodel:expresswayscope:eqversion:x8.10

Trust: 1.0

vendor:adtranmodel: - scope: - version: -

Trust: 0.8

vendor:akamaimodel: - scope: - version: -

Trust: 0.8

vendor:amazonmodel: - scope: - version: -

Trust: 0.8

vendor:aristamodel: - scope: - version: -

Trust: 0.8

vendor:check pointmodel: - scope: - version: -

Trust: 0.8

vendor:debian gnu linuxmodel: - scope: - version: -

Trust: 0.8

vendor:f5model: - scope: - version: -

Trust: 0.8

vendor:freebsdmodel: - scope: - version: -

Trust: 0.8

vendor:junipermodel: - scope: - version: -

Trust: 0.8

vendor:ubuntumodel: - scope: - version: -

Trust: 0.8

vendor:f5model:big-ip application security managerscope:eqversion:12.1.1

Trust: 0.6

vendor:f5model:big-ip application security managerscope:eqversion:11.6.3

Trust: 0.6

vendor:f5model:big-ip application security managerscope:eqversion:11.6.2

Trust: 0.6

vendor:f5model:big-ip application security managerscope:eqversion:12.1.0

Trust: 0.6

vendor:f5model:big-ip application security managerscope:eqversion:11.6.1

Trust: 0.6

vendor:f5model:big-ip application security managerscope:eqversion:12.1.2

Trust: 0.6

vendor:f5model:big-ip application security managerscope:eqversion:12.1.3

Trust: 0.6

vendor:redhatmodel:enterprise mrgscope:eqversion:2

Trust: 0.3

vendor:redhatmodel:enterprise linuxscope:eqversion:7

Trust: 0.3

vendor:redhatmodel:enterprise linuxscope:eqversion:6

Trust: 0.3

vendor:redhatmodel:enterprise linuxscope:eqversion:5

Trust: 0.3

vendor:oraclemodel:communications session border controller scz8.1.0scope: - version: -

Trust: 0.3

vendor:oraclemodel:communications session border controller scz8.0.0scope: - version: -

Trust: 0.3

vendor:oraclemodel:communications session border controller scz7.4.1scope: - version: -

Trust: 0.3

vendor:oraclemodel:communications session border controller scz7.4.0scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.17.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.17.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.17.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.16.11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.16.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.16.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.16.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.15.14

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.15.11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.15.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.15.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.14.31

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.14.13

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.14.11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.14.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.14.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.14.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.14.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.13.11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.13.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.13.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.13.8

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.13.7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.13.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.13.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.13.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.12.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.12.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.12.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.12.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.11.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.11.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.11.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.11.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.11.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.11.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.10.15

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.10.13

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.10.12

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.10.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.10.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.10.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.9.13

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.9.8

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.9.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.9.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.9.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.9.11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.17.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.17.11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.17.10

Trust: 0.3

vendor:linuxmodel:kernel 4.17-rc2scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.17

Trust: 0.3

vendor:linuxmodel:kernel 4.16-rc7scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernel 4.16-rc6scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernel 4.16-rcscope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.16

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.15.8

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.15.7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.15.16

Trust: 0.3

vendor:linuxmodel:kernel 4.15-rc5scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.15

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.14.8

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.14.7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.14.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.14.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.14.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.14.15

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.14.14

Trust: 0.3

vendor:linuxmodel:kernel 4.14.0-rc1scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernel 4.14-rc5scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernel 4.14-rc1scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.14

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.13.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.13.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.13.1

Trust: 0.3

vendor:linuxmodel:kernel 4.13-rc1scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.13

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.12.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.12.1

Trust: 0.3

vendor:linuxmodel:kernel 4.12-rc1scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.12

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.11.8

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.11.7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.10.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.10.8

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.10.7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.10.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.10.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.10.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.10.11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.10.1

Trust: 0.3

vendor:junipermodel:vsrx seriesscope:eqversion:0

Trust: 0.3

vendor:junipermodel:vmxscope:eqversion: -

Trust: 0.3

vendor:junipermodel:qfx5200scope:eqversion:0

Trust: 0.3

vendor:junipermodel:qfx5100scope:eqversion:0

Trust: 0.3

vendor:junipermodel:qfx10008scope:eqversion:0

Trust: 0.3

vendor:junipermodel:ptx10008scope:eqversion:0

Trust: 0.3

vendor:junipermodel:nfxscope:eqversion:2500

Trust: 0.3

vendor:junipermodel:nfxscope:eqversion:1500

Trust: 0.3

vendor:junipermodel:mx80scope:eqversion:0

Trust: 0.3

vendor:junipermodel:mx480scope:eqversion:0

Trust: 0.3

vendor:citrixmodel:receiver for linuxscope:eqversion:0

Trust: 0.3

vendor:citrixmodel:linux virtual desktopscope:eqversion:0

Trust: 0.3

sources: CERT/CC: VU#962459 // BID: 104976 // CNNVD: CNNVD-201808-175 // NVD: CVE-2018-5390

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-5390
value: HIGH

Trust: 1.0

CNNVD: CNNVD-201808-175
value: HIGH

Trust: 0.6

VULHUB: VHN-135421
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2018-5390
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-135421
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-5390
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

sources: VULHUB: VHN-135421 // CNNVD: CNNVD-201808-175 // NVD: CVE-2018-5390

PROBLEMTYPE DATA

problemtype:CWE-400

Trust: 1.1

problemtype:CWE-20

Trust: 0.1

sources: VULHUB: VHN-135421 // NVD: CVE-2018-5390

THREAT TYPE

remote

Trust: 0.8

sources: PACKETSTORM: 149310 // PACKETSTORM: 148850 // CNNVD: CNNVD-201808-175

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201808-175

PATCH

title:Linux kernel Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=83981

Trust: 0.6

sources: CNNVD: CNNVD-201808-175

EXTERNAL IDS

db:NVDid:CVE-2018-5390

Trust: 3.0

db:CERT/CCid:VU#962459

Trust: 2.8

db:BIDid:104976

Trust: 2.0

db:SECTRACKid:1041434

Trust: 1.7

db:SECTRACKid:1041424

Trust: 1.7

db:OPENWALLid:OSS-SECURITY/2019/07/06/4

Trust: 1.7

db:OPENWALLid:OSS-SECURITY/2019/07/06/3

Trust: 1.7

db:OPENWALLid:OSS-SECURITY/2019/06/28/2

Trust: 1.7

db:SIEMENSid:SSA-377115

Trust: 1.7

db:JUNIPERid:JSA10876

Trust: 1.1

db:CNNVDid:CNNVD-201808-175

Trust: 0.7

db:AUSCERTid:ESB-2019.1328

Trust: 0.6

db:AUSCERTid:ESB-2019.2021.2

Trust: 0.6

db:AUSCERTid:ESB-2019.2021

Trust: 0.6

db:AUSCERTid:ESB-2019.2497

Trust: 0.6

db:AUSCERTid:ESB-2020.1315

Trust: 0.6

db:AUSCERTid:ESB-2018.2468.7

Trust: 0.6

db:AUSCERTid:ESB-2019.2661

Trust: 0.6

db:AUSCERTid:ESB-2019.2262

Trust: 0.6

db:ICS CERTid:ICSA-20-105-05

Trust: 0.6

db:PACKETSTORMid:149542

Trust: 0.2

db:PACKETSTORMid:149545

Trust: 0.2

db:PACKETSTORMid:148850

Trust: 0.2

db:PACKETSTORMid:149310

Trust: 0.2

db:PACKETSTORMid:149544

Trust: 0.1

db:PACKETSTORMid:149231

Trust: 0.1

db:PACKETSTORMid:148841

Trust: 0.1

db:VULHUBid:VHN-135421

Trust: 0.1

db:PACKETSTORMid:150070

Trust: 0.1

db:PACKETSTORMid:149543

Trust: 0.1

db:PACKETSTORMid:148839

Trust: 0.1

db:PACKETSTORMid:149830

Trust: 0.1

db:PACKETSTORMid:149826

Trust: 0.1

db:PACKETSTORMid:148916

Trust: 0.1

sources: CERT/CC: VU#962459 // VULHUB: VHN-135421 // BID: 104976 // PACKETSTORM: 149310 // PACKETSTORM: 148850 // PACKETSTORM: 150070 // PACKETSTORM: 149543 // PACKETSTORM: 149542 // PACKETSTORM: 148839 // PACKETSTORM: 149545 // PACKETSTORM: 149830 // PACKETSTORM: 149826 // PACKETSTORM: 148916 // CNNVD: CNNVD-201808-175 // NVD: CVE-2018-5390

REFERENCES

url:http://www.securityfocus.com/bid/104976

Trust: 2.9

url:https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=1a4f14bab1868b443f0dd3c55b689a478f82e72e

Trust: 2.5

url:https://support.f5.com/csp/article/k95343321

Trust: 2.5

url:https://usn.ubuntu.com/3732-2/

Trust: 2.5

url:https://www.kb.cert.org/vuls/id/962459

Trust: 2.0

url:https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html

Trust: 2.0

url:https://access.redhat.com/errata/rhsa-2018:2776

Trust: 1.8

url:https://access.redhat.com/errata/rhsa-2018:2789

Trust: 1.8

url:https://access.redhat.com/errata/rhsa-2018:2791

Trust: 1.8

url:https://access.redhat.com/errata/rhsa-2018:2924

Trust: 1.8

url:https://access.redhat.com/errata/rhsa-2018:2933

Trust: 1.8

url:https://access.redhat.com/errata/rhsa-2018:2948

Trust: 1.8

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180824-linux-tcp

Trust: 1.7

url:http://www.arubanetworks.com/assets/alert/aruba-psa-2018-004.txt

Trust: 1.7

url:http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20181031-02-linux-en

Trust: 1.7

url:https://cert-portal.siemens.com/productcert/pdf/ssa-377115.pdf

Trust: 1.7

url:https://help.ecostruxureit.com/display/public/uadce725/security+fixes+in+struxureware+data+center+expert+v7.6.0

Trust: 1.7

url:https://security.netapp.com/advisory/ntap-20180815-0003/

Trust: 1.7

url:https://www.a10networks.com/support/security-advisories/tcp-ip-cve-2018-5390-segmentsmack

Trust: 1.7

url:https://www.synology.com/support/security/synology_sa_18_41

Trust: 1.7

url:https://www.debian.org/security/2018/dsa-4266

Trust: 1.7

url:https://www.oracle.com/security-alerts/cpujul2020.html

Trust: 1.7

url:https://lists.debian.org/debian-lts-announce/2018/08/msg00014.html

Trust: 1.7

url:http://www.openwall.com/lists/oss-security/2019/06/28/2

Trust: 1.7

url:http://www.openwall.com/lists/oss-security/2019/07/06/3

Trust: 1.7

url:http://www.openwall.com/lists/oss-security/2019/07/06/4

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:2384

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:2395

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:2402

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:2403

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:2645

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:2785

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:2790

Trust: 1.7

url:http://www.securitytracker.com/id/1041424

Trust: 1.7

url:http://www.securitytracker.com/id/1041434

Trust: 1.7

url:https://usn.ubuntu.com/3732-1/

Trust: 1.7

url:https://usn.ubuntu.com/3741-1/

Trust: 1.7

url:https://usn.ubuntu.com/3741-2/

Trust: 1.7

url:https://usn.ubuntu.com/3742-1/

Trust: 1.7

url:https://usn.ubuntu.com/3742-2/

Trust: 1.7

url:https://usn.ubuntu.com/3763-1/

Trust: 1.7

url:https://www.freebsd.org/security/advisories/freebsd-sa-18:08.tcp.asc

Trust: 1.6

url:https://www.spinics.net/lists/netdev/msg514742.html

Trust: 1.1

url:https://support.f5.com/csp/article/k95343321?utm_source=f5support&amp%3butm_medium=rss

Trust: 1.0

url:https://access.redhat.com/security/cve/cve-2018-5390

Trust: 0.9

url:https://nvd.nist.gov/vuln/detail/cve-2018-5390

Trust: 0.9

url:https://supportforums.adtran.com/docs/doc-9261

Trust: 0.8

url:https://blogs.akamai.com/2018/08/linux-kernel-tcp-vulnerability.html

Trust: 0.8

url:https://alas.aws.amazon.com/alas-2018-1049.html

Trust: 0.8

url:https://www.arista.com/en/support/advisories-notices/security-advisories/5721-security-advisory-36

Trust: 0.8

url:https://supportcenter.checkpoint.com/supportcenter/portal?eventsubmit_dogoviewsolutiondetails=&solutionid=sk134253

Trust: 0.8

url:https://lists.debian.org/debian-security-announce/2018/msg00195.html

Trust: 0.8

url:https://kb.juniper.net/jsa10876

Trust: 0.8

url:https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2018-686

Trust: 0.8

url:https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2018-696

Trust: 0.8

url:https://www.suse.com/c/suse-addresses-segmentsmack-attack/

Trust: 0.8

url:https://www.zyxel.com/support/linux_kernel_tcp_flaw.shtml

Trust: 0.8

url:https://access.redhat.com/articles/11258

Trust: 0.6

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.6

url:https://bugzilla.redhat.com/):

Trust: 0.6

url:https://access.redhat.com/security/team/contact/

Trust: 0.6

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.6

url:https://access.redhat.com/security/team/key/

Trust: 0.6

url:https://support.f5.com/csp/article/k95343321?utm_source=f5support&utm_medium=rss

Trust: 0.6

url:https://www.suse.com/support/update/announcement/2019/suse-su-20191437-1.html

Trust: 0.6

url:https://www.suse.com/support/update/announcement/2019/suse-su-20191425-1.html

Trust: 0.6

url:https://www.suse.com/support/update/announcement/2019/suse-su-20191422-1.html

Trust: 0.6

url:https://www.suse.com/support/update/announcement/2019/suse-su-20191767-1.html

Trust: 0.6

url:https://www.suse.com/support/update/announcement/2019/suse-su-20191870-1.html

Trust: 0.6

url:https://www.suse.com/support/update/announcement/2019/suse-su-20192829-1.html

Trust: 0.6

url:https://www.suse.com/support/update/announcement/2019/suse-su-20192821-1.html

Trust: 0.6

url:https://www.suse.com/support/update/announcement/2019/suse-su-20190955-1.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.1315/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.2021.2/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.2497/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.2661/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.2021/

Trust: 0.6

url:http://www.ibm.com/support/docview.wss?uid=ibm10875814

Trust: 0.6

url:https://www.auscert.org.au/bulletins/79262

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.2262/

Trust: 0.6

url:https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20181031-02-linux-cn

Trust: 0.6

url:https://us-cert.cisa.gov/ics/advisories/icsa-20-105-05

Trust: 0.6

url:https://www.us-cert.gov/ics/advisories/icsa-20-105-05

Trust: 0.6

url:https://www.auscert.org.au/bulletins/67070

Trust: 0.6

url:https://access.redhat.com/security/cve/cve-2018-5391

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2018-5391

Trust: 0.4

url:http://www.kernel.org/

Trust: 0.3

url:https://bugzilla.redhat.com/show_bug.cgi?id=1601704

Trust: 0.3

url:https://support.citrix.com/article/ctx237244

Trust: 0.3

url:https://securityadvisories.paloaltonetworks.com/home/detail/132

Trust: 0.3

url:https://kb.juniper.net/infocenter/index?page=content&id=jsa10876

Trust: 0.3

url:https://access.redhat.com/articles/3553061

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2018-10675

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2018-10675

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2018-14634

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2018-14634

Trust: 0.2

url:https://access.redhat.com/security/vulnerabilities/mutagen-astronomy

Trust: 0.2

url:https://support.f5.com/csp/article/k95343321?utm_source=f5support&amp;amp;utm_medium=rss

Trust: 0.1

url:https://usn.ubuntu.com/usn/usn-3763-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-hwe/4.15.0-30.32~16.04.1

Trust: 0.1

url:https://usn.ubuntu.com/usn/usn-3732-2

Trust: 0.1

url:https://usn.ubuntu.com/usn/usn-3732-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp/4.15.0-1015.15~16.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure/4.15.0-1019.19~16.04.1

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-7566

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-1120

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-1000200

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-16648

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-10880

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-10882

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-10883

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-1065

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-5803

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-10881

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-10322

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-14619

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.6_release_notes/index

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-10877

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-10878

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-13405

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-10880

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-10882

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-18208

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-12232

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-17805

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-1000026

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-3639

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-1000200

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-17805

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-10877

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-10879

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-10883

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-1000204

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-10322

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-16648

Trust: 0.1

url:https://access.redhat.com/security/vulnerabilities/ssbd

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-10879

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-1092

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-11506

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-5750

Trust: 0.1

url:https://access.redhat.com/articles/3658021

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-18075

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-10881

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-1095

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-13166

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-1118

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-17806

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-13166

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-1000026

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-8781

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-18208

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-9363

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-14641

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-1065

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-1068

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-5344

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-1094

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-18344

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-10940

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-1068

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-1092

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-18344

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-1094

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-7757

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-10940

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-5848

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-1118

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-10878

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-1095

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-1000204

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-18075

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-17806

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-1120

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-13405

Trust: 0.1

url:https://www.debian.org/security/faq

Trust: 0.1

url:https://security-tracker.debian.org/tracker/linux

Trust: 0.1

url:https://www.debian.org/security/

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/4.4.0-1027.30

Trust: 0.1

url:https://usn.ubuntu.com/usn/usn-3741-1

Trust: 0.1

url:https://wiki.ubuntu.com/securityteam/knowledgebase/l1tf

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-3620

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-3646

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-lts-xenial/4.4.0-133.159~14.04.1

Trust: 0.1

url:https://usn.ubuntu.com/usn/usn-3741-2

Trust: 0.1

sources: CERT/CC: VU#962459 // VULHUB: VHN-135421 // BID: 104976 // PACKETSTORM: 149310 // PACKETSTORM: 148850 // PACKETSTORM: 150070 // PACKETSTORM: 149543 // PACKETSTORM: 149542 // PACKETSTORM: 148839 // PACKETSTORM: 149545 // PACKETSTORM: 149830 // PACKETSTORM: 149826 // PACKETSTORM: 148916 // CNNVD: CNNVD-201808-175 // NVD: CVE-2018-5390

CREDITS

Juha-Matti Tilli

Trust: 0.9

sources: BID: 104976 // CNNVD: CNNVD-201808-175

SOURCES

db:CERT/CCid:VU#962459
db:VULHUBid:VHN-135421
db:BIDid:104976
db:PACKETSTORMid:149310
db:PACKETSTORMid:148850
db:PACKETSTORMid:150070
db:PACKETSTORMid:149543
db:PACKETSTORMid:149542
db:PACKETSTORMid:148839
db:PACKETSTORMid:149545
db:PACKETSTORMid:149830
db:PACKETSTORMid:149826
db:PACKETSTORMid:148916
db:CNNVDid:CNNVD-201808-175
db:NVDid:CVE-2018-5390

LAST UPDATE DATE

2024-11-11T19:55:21.562000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#962459date:2018-09-14T00:00:00
db:VULHUBid:VHN-135421date:2020-09-18T00:00:00
db:BIDid:104976date:2019-02-13T13:00:00
db:CNNVDid:CNNVD-201808-175date:2020-09-21T00:00:00
db:NVDid:CVE-2018-5390date:2023-11-07T02:58:42.387

SOURCES RELEASE DATE

db:CERT/CCid:VU#962459date:2018-08-06T00:00:00
db:VULHUBid:VHN-135421date:2018-08-06T00:00:00
db:BIDid:104976date:2018-08-06T00:00:00
db:PACKETSTORMid:149310date:2018-09-11T15:41:34
db:PACKETSTORMid:148850date:2018-08-07T22:22:00
db:PACKETSTORMid:150070date:2018-10-31T01:11:59
db:PACKETSTORMid:149543date:2018-09-25T23:02:25
db:PACKETSTORMid:149542date:2018-09-25T23:02:15
db:PACKETSTORMid:148839date:2018-08-07T13:13:00
db:PACKETSTORMid:149545date:2018-09-25T23:02:44
db:PACKETSTORMid:149830date:2018-10-17T15:42:07
db:PACKETSTORMid:149826date:2018-10-17T15:40:19
db:PACKETSTORMid:148916date:2018-08-15T04:42:57
db:CNNVDid:CNNVD-201808-175date:2018-08-07T00:00:00
db:NVDid:CVE-2018-5390date:2018-08-06T20:29:01.570