ID

VAR-201809-1153


CVE

CVE-2018-5391


TITLE

Linux kernel IP fragment re-assembly vulnerable to denial of service

Trust: 0.8

sources: CERT/CC: VU#641765

DESCRIPTION

The Linux kernel, versions 3.9+, is vulnerable to a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may cause a denial of service condition by sending specially crafted IP fragments. Various vulnerabilities in IP fragmentation have been discovered and fixed over the years. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size. Service disruption as a result (DoS) There is a possibility of being attacked. Linux Kernel is prone to a remote denial-of-service vulnerability. An attacker can exploit this issue to cause a denial-of-service condition. (BZ#1625330) 4. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Important: kernel security, bug fix, and enhancement update Advisory ID: RHSA-2018:3083-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2018:3083 Issue date: 2018-10-30 CVE Names: CVE-2015-8830 CVE-2016-4913 CVE-2017-0861 CVE-2017-10661 CVE-2017-17805 CVE-2017-18208 CVE-2017-18232 CVE-2017-18344 CVE-2018-1092 CVE-2018-1094 CVE-2018-1118 CVE-2018-1120 CVE-2018-1130 CVE-2018-5344 CVE-2018-5391 CVE-2018-5803 CVE-2018-5848 CVE-2018-7740 CVE-2018-7757 CVE-2018-8781 CVE-2018-10322 CVE-2018-10878 CVE-2018-10879 CVE-2018-10881 CVE-2018-10883 CVE-2018-10902 CVE-2018-10940 CVE-2018-13405 CVE-2018-1000026 ==================================================================== 1. Summary: An update for kernel is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7) - noarch, ppc64le, s390x Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7) - ppc64le 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * A flaw named FragmentSmack was found in the way the Linux kernel handled reassembly of fragmented IPv4 and IPv6 packets. (CVE-2018-5391) * kernel: out-of-bounds access in the show_timer function in kernel/time/posix-timers.c (CVE-2017-18344) * kernel: Integer overflow in udl_fb_mmap() can allow attackers to execute code in kernel space (CVE-2018-8781) * kernel: MIDI driver race condition leads to a double-free (CVE-2018-10902) * kernel: Missing check in inode_init_owner() does not clear SGID bit on non-directories for non-members (CVE-2018-13405) * kernel: AIO write triggers integer overflow in some protocols (CVE-2015-8830) * kernel: Use-after-free in snd_pcm_info function in ALSA subsystem potentially leads to privilege escalation (CVE-2017-0861) * kernel: Handling of might_cancel queueing is not properly pretected against race (CVE-2017-10661) * kernel: Salsa20 encryption algorithm does not correctly handle zero-length inputs allowing local attackers to cause denial of service (CVE-2017-17805) * kernel: Inifinite loop vulnerability in madvise_willneed() function allows local denial of service (CVE-2017-18208) * kernel: fuse-backed file mmap-ed onto process cmdline arguments causes denial of service (CVE-2018-1120) * kernel: a null pointer dereference in dccp_write_xmit() leads to a system crash (CVE-2018-1130) * kernel: drivers/block/loop.c mishandles lo_release serialization allowing denial of service (CVE-2018-5344) * kernel: Missing length check of payload in _sctp_make_chunk() function allows denial of service (CVE-2018-5803) * kernel: buffer overflow in drivers/net/wireless/ath/wil6210/wmi.c:wmi_set_ie() may lead to memory corruption (CVE-2018-5848) * kernel: out-of-bound write in ext4_init_block_bitmap function with a crafted ext4 image (CVE-2018-10878) * kernel: Improper validation in bnx2x network card driver can allow for denial of service attacks via crafted packet (CVE-2018-1000026) * kernel: Information leak when handling NM entries containing NUL (CVE-2016-4913) * kernel: Mishandling mutex within libsas allowing local Denial of Service (CVE-2017-18232) * kernel: NULL pointer dereference in ext4_process_freed_data() when mounting crafted ext4 image (CVE-2018-1092) * kernel: NULL pointer dereference in ext4_xattr_inode_hash() causes crash with crafted ext4 image (CVE-2018-1094) * kernel: vhost: Information disclosure in vhost/vhost.c:vhost_new_msg() (CVE-2018-1118) * kernel: Denial of service in resv_map_release function in mm/hugetlb.c (CVE-2018-7740) * kernel: Memory leak in the sas_smp_get_phy_events function in drivers/scsi/libsas/sas_expander.c (CVE-2018-7757) * kernel: Invalid pointer dereference in xfs_ilock_attr_map_shared() when mounting crafted xfs image allowing denial of service (CVE-2018-10322) * kernel: use-after-free detected in ext4_xattr_set_entry with a crafted file (CVE-2018-10879) * kernel: out-of-bound access in ext4_get_group_info() when mounting and operating a crafted ext4 image (CVE-2018-10881) * kernel: stack-out-of-bounds write in jbd2_journal_dirty_metadata function (CVE-2018-10883) * kernel: incorrect memory bounds check in drivers/cdrom/cdrom.c (CVE-2018-10940) Red Hat would like to thank Juha-Matti Tilli (Aalto University - Department of Communications and Networking and Nokia Bell Labs) for reporting CVE-2018-5391; Trend Micro Zero Day Initiative for reporting CVE-2018-10902; Qualys Research Labs for reporting CVE-2018-1120; Evgenii Shatokhin (Virtuozzo Team) for reporting CVE-2018-1130; and Wen Xu for reporting CVE-2018-1092 and CVE-2018-1094. 4. Solution: For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.6 Release Notes linked from the References section. For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1314275 - CVE-2015-8830 kernel: AIO write triggers integer overflow in some protocols 1322930 - [RFE] Allow xfs to modify labels on mounted filesystem 1337528 - CVE-2016-4913 kernel: Information leak when handling NM entries containing NUL 1481136 - CVE-2017-10661 kernel: Handling of might_cancel queueing is not properly pretected against race 1488484 - GRE: IFLA_MTU ignored on NEWLINK 1504058 - kernel panic with nfsd while removing locks on file close 1507027 - [ESXi][RHEL7.6]x86/vmware: Add paravirt sched clock 1528312 - CVE-2017-17805 kernel: Salsa20 encryption algorithm does not correctly handle zero-length inputs allowing local attackers to cause denial-of-service 1533909 - CVE-2018-5344 kernel: drivers/block/loop.c mishandles lo_release serialization allowing denial-of-service 1541846 - CVE-2018-1000026 kernel: Improper validation in bnx2x network card driver can allow for denial of service attacks via crafted packet 1542494 - VMs with NVMe devices passed through sometimes fail to be launched 1551051 - CVE-2018-5803 kernel: Missing length check of payload in net/sctp/sm_make_chunk.c:_sctp_make_chunk() function allows denial of service 1551565 - CVE-2017-18208 kernel: Inifinite loop vulnerability in mm/madvise.c:madvise_willneed() function allows local denial of service 1552867 - CVE-2018-7740 kernel: Denial of service in resv_map_release function in mm/hugetlb.c 1553361 - CVE-2018-7757 kernel: Memory leak in the sas_smp_get_phy_events function in drivers/scsi/libsas/sas_expander.c 1557434 - bio too big device md0 (1024 > 256) 1557599 - [RFE] Rebase ipset (kernel) to latest upstream 1558066 - CVE-2017-18232 kernel: Mishandling mutex within libsas allowing local Denial of Service 1558328 - Kernel data path test with OVS 2.9 + DPDK 17.11 fails with low throughput 1560777 - CVE-2018-1092 kernel: NULL pointer dereference in ext4/mballoc.c:ext4_process_freed_data() when mounting crafted ext4 image 1560788 - CVE-2018-1094 kernel: NULL pointer dereference in ext4/xattr.c:ext4_xattr_inode_hash() causes crash with crafted ext4 image 1561162 - [RHEL7.5] Extreme performance impact caused by raid resync 1563697 - Triming on full pool can trigger 'dm_pool_alloc_data_block' failed: error = -28 1563994 - CVE-2017-0861 kernel: Use-after-free in snd_pcm_info function in ALSA subsystem potentially leads to privilege escalation 1564186 - XFS may block endlessly in xlog_wait() on IO error 1568167 - crypto aesni-intel aes(gcm) is broken for IPsec 1571062 - CVE-2018-8781 kernel: Integer overflow in drivers/gpu/drm/udl/udl_fb.c:udl_fb_mmap() can allow attackers to execute code in kernel space 1571623 - CVE-2018-10322 kernel: Invalid pointer dereference in xfs_ilock_attr_map_shared() when mounting crafted xfs image allowing denial of service 1572983 - conntrack doesn't track packets in specific network namespace if those packets were processed by CT --notrack target in other network namespace 1573699 - CVE-2018-1118 kernel: vhost: Information disclosure in vhost/vhost.c:vhost_new_msg() 1575472 - CVE-2018-1120 kernel: fuse-backed file mmap-ed onto process cmdline arguments causes denial of service 1576419 - CVE-2018-1130 kernel: a null pointer dereference in net/dccp/output.c:dccp_write_xmit() leads to a system crash 1577408 - CVE-2018-10940 kernel: incorrect memory bounds check in drivers/cdrom/cdrom.c 1584775 - VMs hung after migration 1590720 - CVE-2018-10902 kernel: MIDI driver race condition leads to a double-free 1590799 - CVE-2018-5848 kernel: buffer overflow in drivers/net/wireless/ath/wil6210/wmi.c:wmi_set_ie() may lead to memory corruption 1592654 - [NVMe Device Assignment] Guest reboot failed from the NVMe assigned which os installed on 1596802 - CVE-2018-10878 kernel: out-of-bound write in ext4_init_block_bitmap function with a crafted ext4 image 1596806 - CVE-2018-10879 kernel: use-after-free detected in ext4_xattr_set_entry with a crafted file 1596828 - CVE-2018-10881 kernel: out-of-bound access in ext4_get_group_info() when mounting and operating a crafted ext4 image 1596846 - CVE-2018-10883 kernel: stack-out-of-bounds write in jbd2_journal_dirty_metadata function 1599161 - CVE-2018-13405 kernel: Missing check in fs/inode.c:inode_init_owner() does not clear SGID bit on non-directories for non-members 1609664 - CVE-2018-5391 kernel: IP fragments with random offsets allow a remote denial of service (FragmentSmack) 1609717 - [unwinder] CPU spins indefinitely in __save_stack_trace() call chain 1610958 - CVE-2017-18344 kernel: out-of-bounds access in the show_timer function in kernel/time/posix-timers.c 6. Package List: Red Hat Enterprise Linux Client (v. 7): Source: kernel-3.10.0-957.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-957.el7.noarch.rpm kernel-doc-3.10.0-957.el7.noarch.rpm x86_64: bpftool-3.10.0-957.el7.x86_64.rpm kernel-3.10.0-957.el7.x86_64.rpm kernel-debug-3.10.0-957.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-957.el7.x86_64.rpm kernel-debug-devel-3.10.0-957.el7.x86_64.rpm kernel-debuginfo-3.10.0-957.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-957.el7.x86_64.rpm kernel-devel-3.10.0-957.el7.x86_64.rpm kernel-headers-3.10.0-957.el7.x86_64.rpm kernel-tools-3.10.0-957.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-957.el7.x86_64.rpm kernel-tools-libs-3.10.0-957.el7.x86_64.rpm perf-3.10.0-957.el7.x86_64.rpm perf-debuginfo-3.10.0-957.el7.x86_64.rpm python-perf-3.10.0-957.el7.x86_64.rpm python-perf-debuginfo-3.10.0-957.el7.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: kernel-debug-debuginfo-3.10.0-957.el7.x86_64.rpm kernel-debuginfo-3.10.0-957.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-957.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-957.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-957.el7.x86_64.rpm perf-debuginfo-3.10.0-957.el7.x86_64.rpm python-perf-debuginfo-3.10.0-957.el7.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: kernel-3.10.0-957.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-957.el7.noarch.rpm kernel-doc-3.10.0-957.el7.noarch.rpm x86_64: bpftool-3.10.0-957.el7.x86_64.rpm kernel-3.10.0-957.el7.x86_64.rpm kernel-debug-3.10.0-957.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-957.el7.x86_64.rpm kernel-debug-devel-3.10.0-957.el7.x86_64.rpm kernel-debuginfo-3.10.0-957.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-957.el7.x86_64.rpm kernel-devel-3.10.0-957.el7.x86_64.rpm kernel-headers-3.10.0-957.el7.x86_64.rpm kernel-tools-3.10.0-957.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-957.el7.x86_64.rpm kernel-tools-libs-3.10.0-957.el7.x86_64.rpm perf-3.10.0-957.el7.x86_64.rpm perf-debuginfo-3.10.0-957.el7.x86_64.rpm python-perf-3.10.0-957.el7.x86_64.rpm python-perf-debuginfo-3.10.0-957.el7.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): x86_64: kernel-debug-debuginfo-3.10.0-957.el7.x86_64.rpm kernel-debuginfo-3.10.0-957.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-957.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-957.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-957.el7.x86_64.rpm perf-debuginfo-3.10.0-957.el7.x86_64.rpm python-perf-debuginfo-3.10.0-957.el7.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: kernel-3.10.0-957.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-957.el7.noarch.rpm kernel-doc-3.10.0-957.el7.noarch.rpm ppc64: kernel-3.10.0-957.el7.ppc64.rpm kernel-bootwrapper-3.10.0-957.el7.ppc64.rpm kernel-debug-3.10.0-957.el7.ppc64.rpm kernel-debug-debuginfo-3.10.0-957.el7.ppc64.rpm kernel-debug-devel-3.10.0-957.el7.ppc64.rpm kernel-debuginfo-3.10.0-957.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-957.el7.ppc64.rpm kernel-devel-3.10.0-957.el7.ppc64.rpm kernel-headers-3.10.0-957.el7.ppc64.rpm kernel-tools-3.10.0-957.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-957.el7.ppc64.rpm kernel-tools-libs-3.10.0-957.el7.ppc64.rpm perf-3.10.0-957.el7.ppc64.rpm perf-debuginfo-3.10.0-957.el7.ppc64.rpm python-perf-3.10.0-957.el7.ppc64.rpm python-perf-debuginfo-3.10.0-957.el7.ppc64.rpm ppc64le: kernel-3.10.0-957.el7.ppc64le.rpm kernel-bootwrapper-3.10.0-957.el7.ppc64le.rpm kernel-debug-3.10.0-957.el7.ppc64le.rpm kernel-debug-debuginfo-3.10.0-957.el7.ppc64le.rpm kernel-debuginfo-3.10.0-957.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-957.el7.ppc64le.rpm kernel-devel-3.10.0-957.el7.ppc64le.rpm kernel-headers-3.10.0-957.el7.ppc64le.rpm kernel-tools-3.10.0-957.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-957.el7.ppc64le.rpm kernel-tools-libs-3.10.0-957.el7.ppc64le.rpm perf-3.10.0-957.el7.ppc64le.rpm perf-debuginfo-3.10.0-957.el7.ppc64le.rpm python-perf-3.10.0-957.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-957.el7.ppc64le.rpm s390x: kernel-3.10.0-957.el7.s390x.rpm kernel-debug-3.10.0-957.el7.s390x.rpm kernel-debug-debuginfo-3.10.0-957.el7.s390x.rpm kernel-debug-devel-3.10.0-957.el7.s390x.rpm kernel-debuginfo-3.10.0-957.el7.s390x.rpm kernel-debuginfo-common-s390x-3.10.0-957.el7.s390x.rpm kernel-devel-3.10.0-957.el7.s390x.rpm kernel-headers-3.10.0-957.el7.s390x.rpm kernel-kdump-3.10.0-957.el7.s390x.rpm kernel-kdump-debuginfo-3.10.0-957.el7.s390x.rpm kernel-kdump-devel-3.10.0-957.el7.s390x.rpm perf-3.10.0-957.el7.s390x.rpm perf-debuginfo-3.10.0-957.el7.s390x.rpm python-perf-3.10.0-957.el7.s390x.rpm python-perf-debuginfo-3.10.0-957.el7.s390x.rpm x86_64: bpftool-3.10.0-957.el7.x86_64.rpm kernel-3.10.0-957.el7.x86_64.rpm kernel-debug-3.10.0-957.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-957.el7.x86_64.rpm kernel-debug-devel-3.10.0-957.el7.x86_64.rpm kernel-debuginfo-3.10.0-957.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-957.el7.x86_64.rpm kernel-devel-3.10.0-957.el7.x86_64.rpm kernel-headers-3.10.0-957.el7.x86_64.rpm kernel-tools-3.10.0-957.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-957.el7.x86_64.rpm kernel-tools-libs-3.10.0-957.el7.x86_64.rpm perf-3.10.0-957.el7.x86_64.rpm perf-debuginfo-3.10.0-957.el7.x86_64.rpm python-perf-3.10.0-957.el7.x86_64.rpm python-perf-debuginfo-3.10.0-957.el7.x86_64.rpm Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7): noarch: kernel-abi-whitelists-3.10.0-957.el7.noarch.rpm kernel-doc-3.10.0-957.el7.noarch.rpm ppc64le: kernel-3.10.0-957.el7.ppc64le.rpm kernel-bootwrapper-3.10.0-957.el7.ppc64le.rpm kernel-debug-3.10.0-957.el7.ppc64le.rpm kernel-debug-debuginfo-3.10.0-957.el7.ppc64le.rpm kernel-debuginfo-3.10.0-957.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-957.el7.ppc64le.rpm kernel-devel-3.10.0-957.el7.ppc64le.rpm kernel-headers-3.10.0-957.el7.ppc64le.rpm kernel-tools-3.10.0-957.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-957.el7.ppc64le.rpm kernel-tools-libs-3.10.0-957.el7.ppc64le.rpm perf-3.10.0-957.el7.ppc64le.rpm perf-debuginfo-3.10.0-957.el7.ppc64le.rpm python-perf-3.10.0-957.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-957.el7.ppc64le.rpm s390x: kernel-3.10.0-957.el7.s390x.rpm kernel-debug-3.10.0-957.el7.s390x.rpm kernel-debug-debuginfo-3.10.0-957.el7.s390x.rpm kernel-debug-devel-3.10.0-957.el7.s390x.rpm kernel-debuginfo-3.10.0-957.el7.s390x.rpm kernel-debuginfo-common-s390x-3.10.0-957.el7.s390x.rpm kernel-devel-3.10.0-957.el7.s390x.rpm kernel-headers-3.10.0-957.el7.s390x.rpm kernel-kdump-3.10.0-957.el7.s390x.rpm kernel-kdump-debuginfo-3.10.0-957.el7.s390x.rpm kernel-kdump-devel-3.10.0-957.el7.s390x.rpm perf-3.10.0-957.el7.s390x.rpm perf-debuginfo-3.10.0-957.el7.s390x.rpm python-perf-3.10.0-957.el7.s390x.rpm python-perf-debuginfo-3.10.0-957.el7.s390x.rpm Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7): ppc64le: kernel-debug-debuginfo-3.10.0-957.el7.ppc64le.rpm kernel-debug-devel-3.10.0-957.el7.ppc64le.rpm kernel-debuginfo-3.10.0-957.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-957.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-957.el7.ppc64le.rpm kernel-tools-libs-devel-3.10.0-957.el7.ppc64le.rpm perf-debuginfo-3.10.0-957.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-957.el7.ppc64le.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64: kernel-debug-debuginfo-3.10.0-957.el7.ppc64.rpm kernel-debuginfo-3.10.0-957.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-957.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-957.el7.ppc64.rpm kernel-tools-libs-devel-3.10.0-957.el7.ppc64.rpm perf-debuginfo-3.10.0-957.el7.ppc64.rpm python-perf-debuginfo-3.10.0-957.el7.ppc64.rpm ppc64le: kernel-debug-debuginfo-3.10.0-957.el7.ppc64le.rpm kernel-debug-devel-3.10.0-957.el7.ppc64le.rpm kernel-debuginfo-3.10.0-957.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-957.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-957.el7.ppc64le.rpm kernel-tools-libs-devel-3.10.0-957.el7.ppc64le.rpm perf-debuginfo-3.10.0-957.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-957.el7.ppc64le.rpm x86_64: kernel-debug-debuginfo-3.10.0-957.el7.x86_64.rpm kernel-debuginfo-3.10.0-957.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-957.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-957.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-957.el7.x86_64.rpm perf-debuginfo-3.10.0-957.el7.x86_64.rpm python-perf-debuginfo-3.10.0-957.el7.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: kernel-3.10.0-957.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-957.el7.noarch.rpm kernel-doc-3.10.0-957.el7.noarch.rpm x86_64: bpftool-3.10.0-957.el7.x86_64.rpm kernel-3.10.0-957.el7.x86_64.rpm kernel-debug-3.10.0-957.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-957.el7.x86_64.rpm kernel-debug-devel-3.10.0-957.el7.x86_64.rpm kernel-debuginfo-3.10.0-957.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-957.el7.x86_64.rpm kernel-devel-3.10.0-957.el7.x86_64.rpm kernel-headers-3.10.0-957.el7.x86_64.rpm kernel-tools-3.10.0-957.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-957.el7.x86_64.rpm kernel-tools-libs-3.10.0-957.el7.x86_64.rpm perf-3.10.0-957.el7.x86_64.rpm perf-debuginfo-3.10.0-957.el7.x86_64.rpm python-perf-3.10.0-957.el7.x86_64.rpm python-perf-debuginfo-3.10.0-957.el7.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: kernel-debug-debuginfo-3.10.0-957.el7.x86_64.rpm kernel-debuginfo-3.10.0-957.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-957.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-957.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-957.el7.x86_64.rpm perf-debuginfo-3.10.0-957.el7.x86_64.rpm python-perf-debuginfo-3.10.0-957.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-8830 https://access.redhat.com/security/cve/CVE-2016-4913 https://access.redhat.com/security/cve/CVE-2017-0861 https://access.redhat.com/security/cve/CVE-2017-10661 https://access.redhat.com/security/cve/CVE-2017-17805 https://access.redhat.com/security/cve/CVE-2017-18208 https://access.redhat.com/security/cve/CVE-2017-18232 https://access.redhat.com/security/cve/CVE-2017-18344 https://access.redhat.com/security/cve/CVE-2018-1092 https://access.redhat.com/security/cve/CVE-2018-1094 https://access.redhat.com/security/cve/CVE-2018-1118 https://access.redhat.com/security/cve/CVE-2018-1120 https://access.redhat.com/security/cve/CVE-2018-1130 https://access.redhat.com/security/cve/CVE-2018-5344 https://access.redhat.com/security/cve/CVE-2018-5391 https://access.redhat.com/security/cve/CVE-2018-5803 https://access.redhat.com/security/cve/CVE-2018-5848 https://access.redhat.com/security/cve/CVE-2018-7740 https://access.redhat.com/security/cve/CVE-2018-7757 https://access.redhat.com/security/cve/CVE-2018-8781 https://access.redhat.com/security/cve/CVE-2018-10322 https://access.redhat.com/security/cve/CVE-2018-10878 https://access.redhat.com/security/cve/CVE-2018-10879 https://access.redhat.com/security/cve/CVE-2018-10881 https://access.redhat.com/security/cve/CVE-2018-10883 https://access.redhat.com/security/cve/CVE-2018-10902 https://access.redhat.com/security/cve/CVE-2018-10940 https://access.redhat.com/security/cve/CVE-2018-13405 https://access.redhat.com/security/cve/CVE-2018-1000026 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/articles/3553061 https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.6_release_notes/index 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2018 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBW9gSCNzjgjWX9erEAQgpqw/8DyLe13g3SkrL6Mem7I/zcrJkZ3n8FB++ q4ewa71pzsPl5pZHDVPF0696m9WsMlaRDtnJGtKBxBmpUbjKTnMqxNp/xYyPqMBC BSHEF/njMwEEa0XPWv2UikNGFR9bM4NlVdxWktgeC6UVuX3iqnkIm/CvPEiKq13D GycbTIdnazhugeu/Rh6qVUgxVWd4ljc+HGBUrnWn6Rhw8DhKWm/S8xgpDpw86qEl 8CxnEjP00QMLo9nHmSVkm8ZobJV3MNhX8iO/UnRkvYGAZ3kl8/VnVmgs5sXHGqM2 aLzkDrgRf0zIVbcoaae1O26Rs4OwRL2DXDBxJ/3I6KASFzCYBcmtpjTsNyL8GX+D 76gKiCzhezunu4b8ErADGDcxLCU4W9LGs9repXNDEjdqY4qJ0kFTpmM4wm3Zpn0Z lyb17zxoXHATGPCgDFVyuL+g8TmOgUdhemNTLAQJXrVRsMxA06l446G3i66UwvQL qmSiknOs7Dzpt+8DdkGqPMJOA6t1ismtk9CO9BstYzxU1ebS6zUusHo0Iavw2v2D gPxsHl2GehMf9M2JHUygJTevcoyBB6OEZtmRdTmIRU9m8d8+90Cig8YwIk1kzZlq XrbwWjP8Mk+g21YGMMi+ksN0LFWf5rVYTRnvKMq7QLrSpjiravS7+gF6ZOH49XRs 0B91wOl3vSo=yaM6 -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . 6) - i386, x86_64 3. Red Hat would like to thank Juha-Matti Tilli (Aalto University - Department of Communications and Networking and Nokia Bell Labs) for reporting CVE-2018-5391 and Qualys Research Labs for reporting CVE-2018-14634. Bug Fix(es): These updated kernel packages include also numerous bug fixes. Space precludes documenting all of the bug fixes in this advisory. See the descriptions in the related Knowledge Article: https://access.redhat.com/articles/3635371 4. Bugs fixed (https://bugzilla.redhat.com/): 1609664 - CVE-2018-5391 kernel: IP fragments with random offsets allow a remote denial of service (FragmentSmack) 1616397 - kernel-2.6.32-754.3.5.el6.x86_64 crash on Dell Inc. PowerEdge 1950 1624498 - CVE-2018-14634 kernel: Integer overflow in Linux's create_elf_tables function 6. ========================================================================== Ubuntu Security Notice USN-3742-3 August 21, 2018 linux-lts-trusty regressions ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 12.04 ESM Summary: USN-3742-2 introduced regressions in the Linux Hardware Enablement (HWE) kernel for Ubuntu 12.04 ESM. Software Description: - linux-lts-trusty: Linux hardware enablement kernel from Trusty for Precise ESM Details: USN-3742-2 introduced mitigations in the Linux Hardware Enablement (HWE) kernel for Ubuntu 12.04 ESM to address L1 Terminal Fault (L1TF) vulnerabilities (CVE-2018-3620, CVE-2018-3646). Unfortunately, the update introduced regressions that caused kernel panics when booting in some environments as well as preventing Java applications from starting. We apologize for the inconvenience. Original advisory details: It was discovered that memory present in the L1 data cache of an Intel CPU core may be exposed to a malicious process that is executing on the CPU core. This vulnerability is also known as L1 Terminal Fault (L1TF). A local attacker in a guest virtual machine could use this to expose sensitive information (memory from other guests or the host OS). (CVE-2018-3646) It was discovered that memory present in the L1 data cache of an Intel CPU core may be exposed to a malicious process that is executing on the CPU core. This vulnerability is also known as L1 Terminal Fault (L1TF). A local attacker could use this to expose sensitive information (memory from the kernel or other processes). (CVE-2018-3620) Andrey Konovalov discovered an out-of-bounds read in the POSIX timers subsystem in the Linux kernel. (CVE-2018-5391) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 12.04 ESM: linux-image-3.13.0-156-generic 3.13.0-156.206~precise1 linux-image-3.13.0-156-generic-lpae 3.13.0-156.206~precise1 linux-image-generic-lpae-lts-trusty 3.13.0.156.146 linux-image-generic-lts-trusty 3.13.0.156.146 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. 6.5) - x86_64 3. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. Bug Fix(es): * Previously, invalid headers in the sk_buff struct led to an indefinite loop in the tcp_collapse() function. As a consequence, the system became unresponsive. This update backports the upstream changes that remove the problematic code in tcp_collapse(). As a result, the system no longer hangs in the described scenario. (BZ#1619630) * After updating the system to prevent the L1 Terminal Fault (L1TF) vulnerability, only one thread was detected on systems that offer processing of two threads on a single processor core. With this update, the "__max_smt_threads()" function has been fixed. As a result, both threads are now detected correctly in the described situation. (BZ#1625333) * Previously, a kernel panic occurred when the kernel tried to make an out of bound access to the array that describes the L1 Terminal Fault (L1TF) mitigation state on systems without Extended Page Tables (EPT) support. This update extends the array of mitigation states to cover all the states, which effectively prevents out of bound array access. Also, this update enables rejecting invalid, irrelevant values, that might be erroneously provided by the userspace. As a result, the kernel no longer panics in the described scenario. (BZ#1629632) 4

Trust: 3.69

sources: NVD: CVE-2018-5391 // CERT/CC: VU#641765 // JVNDB: JVNDB-2018-006630 // BID: 105108 // VULHUB: VHN-135422 // VULMON: CVE-2018-5391 // PACKETSTORM: 148912 // PACKETSTORM: 149543 // PACKETSTORM: 150068 // PACKETSTORM: 148914 // PACKETSTORM: 148917 // PACKETSTORM: 149726 // PACKETSTORM: 149024 // PACKETSTORM: 149830 // PACKETSTORM: 150191 // PACKETSTORM: 150314

AFFECTED PRODUCTS

vendor:canonicalmodel:ubuntu linuxscope:eqversion:16.04

Trust: 1.6

vendor:canonicalmodel:ubuntu linuxscope:eqversion:14.04

Trust: 1.6

vendor:canonicalmodel:ubuntu linuxscope:eqversion:12.04

Trust: 1.6

vendor:canonicalmodel:ubuntu linuxscope:eqversion:18.04

Trust: 1.6

vendor:redhatmodel:enterprise linux server eusscope:eqversion:6.7

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:gteversion:13.0.0

Trust: 1.0

vendor:redhatmodel:enterprise linux server tusscope:eqversion:6.6

Trust: 1.0

vendor:f5model:big-ip analyticsscope:gteversion:11.5.1

Trust: 1.0

vendor:redhatmodel:enterprise linux serverscope:eqversion:7.0

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:ltversion:13.1.3

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:gteversion:13.0.0

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:ltversion:11.6.5.1

Trust: 1.0

vendor:f5model:big-ip application security managerscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:ltversion:14.0.1.1

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:ltversion:12.1.5

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:gteversion:12.1.0

Trust: 1.0

vendor:microsoftmodel:windows server 2016scope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip application security managerscope:ltversion:14.1.2.4

Trust: 1.0

vendor:f5model:big-ip analyticsscope:ltversion:12.1.5

Trust: 1.0

vendor:f5model:big-ip link controllerscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip analyticsscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:ltversion:11.6.5.1

Trust: 1.0

vendor:microsoftmodel:windows 10scope:eqversion:1803

Trust: 1.0

vendor:microsoftmodel:windows 7scope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:ltversion:14.0.1.1

Trust: 1.0

vendor:redhatmodel:enterprise linux server tusscope:eqversion:7.3

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:gteversion:13.0.0

Trust: 1.0

vendor:siemensmodel:simatic rf186ciscope:ltversion:1.3

Trust: 1.0

vendor:siemensmodel:simatic rf188scope:ltversion:1.3

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:ltversion:14.1.2.4

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:ltversion:11.6.5.1

Trust: 1.0

vendor:siemensmodel:simatic net cp 1543-1scope:ltversion:2.2

Trust: 1.0

vendor:redhatmodel:enterprise linux server eusscope:eqversion:7.4

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:gteversion:11.5.1

Trust: 1.0

vendor:f5model:big-ip link controllerscope:ltversion:11.6.5.1

Trust: 1.0

vendor:siemensmodel:simatic net cp 1542sp-1scope:ltversion:2.1

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:ltversion:14.0.1.1

Trust: 1.0

vendor:redhatmodel:enterprise linux server eusscope:eqversion:7.5

Trust: 1.0

vendor:redhatmodel:enterprise linux serverscope:eqversion:6.0

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:gteversion:11.5.1

Trust: 1.0

vendor:f5model:big-ip application security managerscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip link controllerscope:ltversion:14.0.1.1

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:ltversion:14.1.2.4

Trust: 1.0

vendor:f5model:big-ip analyticsscope:ltversion:14.1.2.4

Trust: 1.0

vendor:siemensmodel:sinema remote connect serverscope:gteversion:1.1

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:gteversion:12.1.0

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:6.4

Trust: 1.0

vendor:microsoftmodel:windows server 2012scope:eqversion: -

Trust: 1.0

vendor:siemensmodel:scalance m-800scope:ltversion:6.1

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip link controllerscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:gteversion:11.5.1

Trust: 1.0

vendor:microsoftmodel:windows 10scope:eqversion:1709

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:ltversion:13.1.3

Trust: 1.0

vendor:redhatmodel:enterprise linux desktopscope:eqversion:7.0

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:ltversion:11.6.5.1

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:gteversion:11.5.1

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:ltversion:12.1.5

Trust: 1.0

vendor:siemensmodel:sinema remote connect serverscope:ltversion:2.0.1

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:gteversion:13.0.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:ltversion:14.0.1.1

Trust: 1.0

vendor:microsoftmodel:windows 8.1scope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:ltversion:11.6.5.1

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:ltversion:12.1.5

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:gteversion:11.5.1

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:ltversion:14.0.1.1

Trust: 1.0

vendor:microsoftmodel:windows server 2016scope:eqversion:1803

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:ltversion:11.6.5.1

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:ltversion:11.6.5.1

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:gteversion:11.5.1

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:ltversion:12.1.5

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:ltversion:13.1.3

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:gteversion:12.1.0

Trust: 1.0

vendor:microsoftmodel:windows server 2012scope:eqversion:r2

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:ltversion:14.0.1.1

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:gteversion:14.1.0

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:7.4

Trust: 1.0

vendor:linuxmodel:kernelscope:lteversion:4.18

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:ltversion:14.0.1.1

Trust: 1.0

vendor:f5model:big-ip application security managerscope:gteversion:13.0.0

Trust: 1.0

vendor:siemensmodel:simatic net cp 1543sp-1scope:ltversion:2.1

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:ltversion:12.1.5

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:ltversion:13.1.3

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:gteversion:11.5.1

Trust: 1.0

vendor:siemensmodel:simatic rf188ciscope:ltversion:1.3

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:6.5

Trust: 1.0

vendor:siemensmodel:simatic rf186cscope:ltversion:1.3

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:ltversion:13.1.3

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:gteversion:13.0.0

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:ltversion:14.1.2.4

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip link controllerscope:gteversion:13.0.0

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:ltversion:13.1.3

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:ltversion:12.1.5

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:ltversion:13.1.3

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:ltversion:13.1.3

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:ltversion:11.6.5.1

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:3.9

Trust: 1.0

vendor:f5model:big-ip link controllerscope:ltversion:12.1.5

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:ltversion:11.6.5.1

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:ltversion:14.0.1.1

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:7.2

Trust: 1.0

vendor:redhatmodel:enterprise linux desktopscope:eqversion:6.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:ltversion:14.0.1.1

Trust: 1.0

vendor:microsoftmodel:windows server 2016scope:eqversion:1709

Trust: 1.0

vendor:siemensmodel:simatic net cp 1243-7 lte euscope:ltversion:3.2

Trust: 1.0

vendor:siemensmodel:scalance s615scope:ltversion:6.1

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:8.0

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:ltversion:14.1.2.4

Trust: 1.0

vendor:f5model:big-ip analyticsscope:gteversion:13.0.0

Trust: 1.0

vendor:siemensmodel:scalance w700 ieee 802.11a\/b\/g\/nscope:ltversion:6.4

Trust: 1.0

vendor:f5model:big-ip link controllerscope:ltversion:13.1.3

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:gteversion:14.0.0

Trust: 1.0

vendor:microsoftmodel:windows server 2008scope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:gteversion:11.5.1

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:gteversion:14.0.0

Trust: 1.0

vendor:redhatmodel:enterprise linux server eusscope:eqversion:7.3

Trust: 1.0

vendor:redhatmodel:enterprise linux workstationscope:eqversion:7.0

Trust: 1.0

vendor:siemensmodel:ruggedcom rox iiscope:ltversion:2.13.3

Trust: 1.0

vendor:siemensmodel:simatic net cp 1242-7scope:ltversion:3.2

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:ltversion:14.1.2.4

Trust: 1.0

vendor:microsoftmodel:windows 10scope:eqversion:1607

Trust: 1.0

vendor:f5model:big-ip application security managerscope:ltversion:11.6.5.1

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:gteversion:14.1.0

Trust: 1.0

vendor:siemensmodel:ruggedcom rm1224scope:ltversion:6.1

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:6.6

Trust: 1.0

vendor:f5model:big-ip application security managerscope:ltversion:14.0.1.1

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:ltversion:12.1.5

Trust: 1.0

vendor:f5model:big-ip analyticsscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:ltversion:12.1.5

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:9.0

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:gteversion:12.1.0

Trust: 1.0

vendor:microsoftmodel:windows server 2008scope:eqversion:r2

Trust: 1.0

vendor:microsoftmodel:windows rt 8.1scope:eqversion: -

Trust: 1.0

vendor:siemensmodel:scalance sc-600scope:ltversion:2.0

Trust: 1.0

vendor:redhatmodel:enterprise linux server tusscope:eqversion:7.4

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:ltversion:11.6.5.1

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:gteversion:11.5.1

Trust: 1.0

vendor:siemensmodel:simatic net cp 1243-1scope:ltversion:3.2

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:ltversion:14.0.1.1

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:ltversion:14.1.2.4

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:gteversion:13.0.0

Trust: 1.0

vendor:f5model:big-ip analyticsscope:ltversion:11.6.5.1

Trust: 1.0

vendor:f5model:big-ip application security managerscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:ltversion:14.1.2.4

Trust: 1.0

vendor:siemensmodel:simatic net cp 1243-7 lte usscope:ltversion:3.2

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:gteversion:13.0.0

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:ltversion:12.1.5

Trust: 1.0

vendor:siemensmodel:simatic net cp 1542sp-1 ircscope:ltversion:2.1

Trust: 1.0

vendor:f5model:big-ip analyticsscope:ltversion:14.0.1.1

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:7.3

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:gteversion:14.0.0

Trust: 1.0

vendor:microsoftmodel:windows 10scope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:ltversion:14.1.2.4

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:ltversion:12.1.5

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:ltversion:14.1.2.4

Trust: 1.0

vendor:f5model:big-ip application security managerscope:gteversion:11.5.1

Trust: 1.0

vendor:microsoftmodel:windows 10scope:eqversion:1703

Trust: 1.0

vendor:redhatmodel:enterprise linux workstationscope:eqversion:6.0

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:ltversion:13.1.3

Trust: 1.0

vendor:redhatmodel:enterprise linux server tusscope:eqversion:7.2

Trust: 1.0

vendor:f5model:big-ip link controllerscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:gteversion:13.0.0

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:ltversion:13.1.3

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:gteversion:11.5.1

Trust: 1.0

vendor:siemensmodel:simatic net cp 1243-8 ircscope:ltversion:3.2

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:ltversion:13.1.3

Trust: 1.0

vendor:siemensmodel:scalance w1700 ieee 802.11acscope:ltversion:2.0

Trust: 1.0

vendor:f5model:big-ip analyticsscope:ltversion:13.1.3

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:gteversion:13.0.0

Trust: 1.0

vendor:f5model:big-ip link controllerscope:gteversion:11.5.1

Trust: 1.0

vendor:f5model:big-ip link controllerscope:ltversion:14.1.2.4

Trust: 1.0

vendor:f5model:big-ip analyticsscope:gteversion:14.1.0

Trust: 1.0

vendor:siemensmodel:simatic rf185cscope:ltversion:1.3

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:gteversion:13.0.0

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:ltversion:14.1.2.4

Trust: 1.0

vendor:f5model:big-ip application security managerscope:ltversion:12.1.5

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:gteversion:14.1.0

Trust: 1.0

vendor:aristamodel: - scope: - version: -

Trust: 0.8

vendor:check pointmodel: - scope: - version: -

Trust: 0.8

vendor:debian gnu linuxmodel: - scope: - version: -

Trust: 0.8

vendor:microsoftmodel: - scope: - version: -

Trust: 0.8

vendor:red hatmodel: - scope: - version: -

Trust: 0.8

vendor:suse linuxmodel: - scope: - version: -

Trust: 0.8

vendor:ubuntumodel: - scope: - version: -

Trust: 0.8

vendor:linuxmodel:kernelscope: - version: -

Trust: 0.8

vendor:linuxmodel:kernelscope:eqversion:3.14.2

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:neversion:7.1.20

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.1.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.15.8

Trust: 0.3

vendor:aristamodel:extendible operating system 4.20.5fscope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.73

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.15

Trust: 0.3

vendor:aristamodel:extendible operating system 4.20.5.1fscope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.7

Trust: 0.3

vendor:microsoftmodel:windows server r2scope:eqversion:20120

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:8.0.11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.22

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.18

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.17.11

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.15

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.13.7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10

Trust: 0.3

vendor:linuxmodel:kernel 3.9-rc3scope: - version: -

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:8.0.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.17.2

Trust: 0.3

vendor:redhatmodel:enterprise linuxscope:eqversion:5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.11.5

Trust: 0.3

vendor:oraclemodel:linuxscope:eqversion:7

Trust: 0.3

vendor:aristamodel:extendible operating system 4.20.4fscope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.1

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:8.0.8

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.17.1

Trust: 0.3

vendor:linuxmodel:kernel 4.14-rc5scope: - version: -

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:8.0.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.16

Trust: 0.3

vendor:microsoftmodel:windows version for x64-based systemsscope:eqversion:1018030

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.9

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.1.21

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.10.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.10.10

Trust: 0.3

vendor:microsoftmodel:windows serverscope:eqversion:18030

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.1.18

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.1.22

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.23

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.11.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.14

Trust: 0.3

vendor:aristamodel:extendible operating system 4.20.4.1fscope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.9.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.17

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.12.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.15

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.21

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13.0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.16.7

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.16

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14.37

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.9.11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14.54

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.43

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14.73

Trust: 0.3

vendor:microsoftmodel:windows for x64-based systemsscope:eqversion:8.10

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.13

Trust: 0.3

vendor:microsoftmodel:windows rtscope:eqversion:8.1

Trust: 0.3

vendor:microsoftmodel:windows server r2 for itanium-based systems sp1scope:eqversion:2008

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.12

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:neversion:8.1.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.12

Trust: 0.3

vendor:redhatmodel:enterprise linuxscope:eqversion:6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.9.9

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.21

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.14.7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.16.11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.16

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.14.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.9.13

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.10.3

Trust: 0.3

vendor:linuxmodel:kernel 3.9-rc8scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.17.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.12.1

Trust: 0.3

vendor:microsoftmodel:windows for 32-bit systemsscope:eqversion:8.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.15

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.44

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.49

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.1.11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.9.4

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.20

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18.17

Trust: 0.3

vendor:aristamodel:extendible operating system 4.21.0fscope: - version: -

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:8.1.2

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.1.12

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.10.15

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.13.8

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.16

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.27

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.13.10

Trust: 0.3

vendor:linuxmodel:kernel 4.13-rc1scope: - version: -

Trust: 0.3

vendor:aristamodel:extendible operating system 4.20.7mscope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.14.2

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.19

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:8.1.3

Trust: 0.3

vendor:microsoftmodel:windows server r2 for x64-based systems sp1scope:eqversion:2008

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.12.9

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.1.7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.11.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.14.3

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:8.0.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.13.11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.45

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.19.2

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.9

Trust: 0.3

vendor:aristamodel:extendible operating system 4.20.1fscope: - version: -

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:8.0.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.14.13

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.13

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:8.0.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.37

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.17.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.48

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18.8

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.9.8

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.21

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.81

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.15.10

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.1.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.30

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:8.0.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.10.12

Trust: 0.3

vendor:linuxmodel:kernel 4.14.0-rc1scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernel 4.16-rcscope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.13.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.22

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.10.6

Trust: 0.3

vendor:microsoftmodel:windows for x64-based systemsscope:eqversion:100

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.14.8

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:8.0.4

Trust: 0.3

vendor:microsoftmodel:windows server for x64-based systems sp2scope:eqversion:2008

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.10.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.15.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.16.36

Trust: 0.3

vendor:redhatmodel:enterprise linuxscope:eqversion:7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.15.14

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13.11

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:8.0.7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.10.13

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.1.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.15.4

Trust: 0.3

vendor:microsoftmodel:windows serverscope:eqversion:20160

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.11.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.14.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.41

Trust: 0.3

vendor:ubuntumodel:linux ltsscope:eqversion:14.04

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18.9

Trust: 0.3

vendor:aristamodel:extendible operating system 4.20.6fscope: - version: -

Trust: 0.3

vendor:oraclemodel:linuxscope:eqversion:6.0

Trust: 0.3

vendor:ubuntumodel:linux esmscope:eqversion:12.04

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.10.11

Trust: 0.3

vendor:aristamodel:extendible operating system 4.20.8mscope: - version: -

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.1.8

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.1.17

Trust: 0.3

vendor:microsoftmodel:windows server for itanium-based systems sp2scope:eqversion:2008

Trust: 0.3

vendor:microsoftmodel:windows for 32-bit systems sp1scope:eqversion:7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.15.11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.11.3

Trust: 0.3

vendor:linuxmodel:kernel 3.9-rc1scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.31

Trust: 0.3

vendor:microsoftmodel:windows for x64-based systems sp1scope:eqversion:7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.17.4

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.14

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.14.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.14.14

Trust: 0.3

vendor:linuxmodel:kernel 4.12-rc1scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.17

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.14.11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.14

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.13.3

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.17

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.13.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.1.10

Trust: 0.3

vendor:redhatmodel:enterprise mrgscope:eqversion:2

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.1.4

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.1.2

Trust: 0.3

vendor:microsoftmodel:windows version for 32-bit systemsscope:eqversion:1016070

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.13.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.10.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.14.15

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.14.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.19

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.12

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.11.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.13.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.17.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.15.9

Trust: 0.3

vendor:microsoftmodel:windows server for 32-bit systems sp2scope:eqversion:2008

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13.7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14.79

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.1.16

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.14

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.17

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.14.1

Trust: 0.3

vendor:aristamodel:extendible operating system 4.20.2fscope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.9.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13.6

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:neversion:8.0.13

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.10.7

Trust: 0.3

vendor:microsoftmodel:windows serverscope:eqversion:20120

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.13.5

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.3

Trust: 0.3

vendor:aristamodel:extendible operating systemscope:eqversion:0

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:8.0.12

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:8.0.10

Trust: 0.3

vendor:ubuntumodel:linux ltsscope:eqversion:18.04

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.1.14

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.13.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18.22

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.9.8

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14.45

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.7

Trust: 0.3

vendor:linuxmodel:kernel 4.15-rc5scope: - version: -

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.1.1

Trust: 0.3

vendor:microsoftmodel:windows version for 32-bit systemsscope:eqversion:1017030

Trust: 0.3

vendor:ubuntumodel:linux ltsscope:eqversion:16.04

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.16.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.12.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.16.1

Trust: 0.3

vendor:aristamodel:extendible operating system 4.20.3fscope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows version for 32-bit systemsscope:eqversion:1017090

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.10.9

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:8.1.4

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.11.7

Trust: 0.3

vendor:aristamodel:extendible operating system 4.20.5.2fscope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.18

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:neversion:6.1.22

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.15.7

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:8.1.1

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:8.1

Trust: 0.3

vendor:microsoftmodel:windows serverscope:eqversion:17090

Trust: 0.3

vendor:microsoftmodel:windows for 32-bit systemsscope:eqversion:100

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.20

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.36

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.1.19

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.16.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.12.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.11.8

Trust: 0.3

vendor:linuxmodel:kernel 3.9-rc7scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.90

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.15.16

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.11.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.11.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.2

Trust: 0.3

vendor:microsoftmodel:windows version for x64-based systemsscope:eqversion:1016070

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18.7

Trust: 0.3

vendor:aristamodel:extendible operating system 4.20.0fscope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.16.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.38

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.16.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.15.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.10.1

Trust: 0.3

vendor:microsoftmodel:windows version for 32-bit systemsscope:eqversion:1018030

Trust: 0.3

vendor:aristamodel:extendible operating system 4.20.2.1fscope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.17.6

Trust: 0.3

vendor:linuxmodel:kernel 4.17-rc2scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13.1

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.1.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14.7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.10.8

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.12.4

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.10

Trust: 0.3

vendor:linuxmodel:kernel 4.16-rc6scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.40

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.17.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18.11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.16.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.14.31

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.11.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.26

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.1.13

Trust: 0.3

vendor:microsoftmodel:windows version for x64-based systemsscope:eqversion:1017030

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.17

Trust: 0.3

vendor:microsoftmodel:windows version for x64-based systemsscope:eqversion:1017090

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.11

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.10

Trust: 0.3

vendor:linuxmodel:kernel 4.14-rc1scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernel 4.16-rc7scope: - version: -

Trust: 0.3

sources: CERT/CC: VU#641765 // BID: 105108 // JVNDB: JVNDB-2018-006630 // CNNVD: CNNVD-201808-570 // NVD: CVE-2018-5391

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-5391
value: HIGH

Trust: 1.0

NVD: CVE-2018-5391
value: HIGH

Trust: 0.8

JPCERT/CC: JVNDB-2018-006630
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201808-570
value: HIGH

Trust: 0.6

VULHUB: VHN-135422
value: HIGH

Trust: 0.1

VULMON: CVE-2018-5391
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2018-5391
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

NVD: CVE-2018-5391
severity: HIGH
baseScore: 7.8
vectorString: NONE
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

JPCERT/CC: JVNDB-2018-006630
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-135422
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-5391
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

JPCERT/CC: JVNDB-2018-006630
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CERT/CC: VU#641765 // VULHUB: VHN-135422 // VULMON: CVE-2018-5391 // JVNDB: JVNDB-2018-006630 // CNNVD: CNNVD-201808-570 // NVD: CVE-2018-5391

PROBLEMTYPE DATA

problemtype:CWE-400

Trust: 1.8

problemtype:CWE-20

Trust: 1.1

sources: VULHUB: VHN-135422 // JVNDB: JVNDB-2018-006630 // NVD: CVE-2018-5391

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201808-570

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-201808-570

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-006630

PATCH

title:株式会社インターネットイニシアティブからの情報url:https://jvn.jp/vu/JVNVU93630542/317632/index.html

Trust: 0.8

title:Linux kernel Security vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=84156

Trust: 0.6

title:Red Hat: Important: kernel security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20182846 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security, bug fix, and enhancement updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20183459 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20182785 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20182925 - Security Advisory

Trust: 0.1

title:Debian Security Advisories: DSA-4272-1 linux -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=c4fc75c3940ecd62e6e3d43c90c1ead1

Trust: 0.1

title:Red Hat: Important: kernel security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20182791 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20182924 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20183590 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security, bug fix, and enhancement updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20183540 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20182933 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel-rt security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20183586 - Security Advisory

Trust: 0.1

title:Arch Linux Advisories: [ASA-201903-11] linux-hardened: denial of serviceurl:https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories&qid=ASA-201903-11

Trust: 0.1

title:Ubuntu Security Notice: linux-hwe, linux-azure, linux-gcp vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3740-2

Trust: 0.1

title:IBM: IBM Security Bulletin: Vulnerability in the Linux kernel affects IBM SAN Volume Controller, IBM Storwize, IBM Spectrum Virtualize and IBM FlashSystem products (CVE-2018-5391)url:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=0e5803196f7b186e3c0e200d43325ad6

Trust: 0.1

title:Red Hat: CVE-2018-5391url:https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2018-5391

Trust: 0.1

title:Cisco: Linux Kernel IP Fragment Reassembly Denial of Service Vulnerability Affecting Cisco Products: August 2018url:https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-20180824-linux-ip-fragment

Trust: 0.1

title:Ubuntu Security Notice: linux, linux-aws, linux-azure, linux-gcp, linux-kvm, linux-oem, linux-raspi2 vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3740-1

Trust: 0.1

title:Arch Linux Issues: url:https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues&qid=CVE-2018-5391

Trust: 0.1

title:Ubuntu Security Notice: linux regressionsurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3741-3

Trust: 0.1

title:Ubuntu Security Notice: linux-lts-xenial, linux-aws vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3741-2

Trust: 0.1

title:IBM: IBM Security Bulletin: This Power System update is being released to address CVE-2018-5391url:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=c5babfeb02fdf3e145c777d8eb6dfd0f

Trust: 0.1

title:Ubuntu Security Notice: linux, linux-aws, linux-kvm, linux-raspi2, linux-snapdragon vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3741-1

Trust: 0.1

title:IBM: IBM Security Bulletin: IBM has announced a release for IBM Security Identity Governance and Intelligence in response to security vulnerability (CVE-2018-5391)url:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=cb5671de27781f97454cf1b56d2087e0

Trust: 0.1

title:IBM: IBM Security Bulletin: IBM MQ Appliance is affected by a kernel vulnerability (CVE-2018-5391)url:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=4b24750b4f4494d02c26c4b32a0e107a

Trust: 0.1

title:Ubuntu Security Notice: linux-lts-trusty regressionsurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3742-3

Trust: 0.1

title:Ubuntu Security Notice: linux-lts-trusty vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3742-2

Trust: 0.1

title:Ubuntu Security Notice: linux vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3742-1

Trust: 0.1

title:Siemens Security Advisories: Siemens Security Advisoryurl:https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=d3eead9065d15844d9f0f319ebc3ef51

Trust: 0.1

title:Amazon Linux AMI: ALAS-2018-1058url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2018-1058

Trust: 0.1

title:Amazon Linux 2: ALAS2-2018-1058url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2-2018-1058

Trust: 0.1

title:Palo Alto Networks Security Advisory: url:https://vulmon.com/vendoradvisory?qidtp=palo_alto_networks_security_advisory&qid=0944feb15e174ce784cc2c5c40d923ea

Trust: 0.1

title:Red Hat: Important: kernel-alt security, bug fix, and enhancement updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20182948 - Security Advisory

Trust: 0.1

title:Palo Alto Networks Security Advisory: CVE-2018-5391 Information about FragmentSmack findingsurl:https://vulmon.com/vendoradvisory?qidtp=palo_alto_networks_security_advisory&qid=3c616fb9e55ec6924cfd6ba2622c6c7e

Trust: 0.1

title:Red Hat: Important: kernel security, bug fix, and enhancement updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20183083 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel-rt security, bug fix, and enhancement updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20183096 - Security Advisory

Trust: 0.1

title:Symantec Security Advisories: Linux Kernel Aug 2017 - Sep 2018 Vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=symantec_security_advisories&qid=b3193a96468975c04eb9f136ca9abec4

Trust: 0.1

title:IBM: IBM Security Bulletin: IBM Security Guardium is affected by Red Hat kernel vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=75b9d198a73a91d81765c8b428423224

Trust: 0.1

title:Oracle Linux Bulletins: Oracle Linux Bulletin - July 2018url:https://vulmon.com/vendoradvisory?qidtp=oracle_linux_bulletins&qid=204a1aa9ebf7b5f47151e8b011269862

Trust: 0.1

title:Oracle VM Server for x86 Bulletins: Oracle VM Server for x86 Bulletin - July 2018url:https://vulmon.com/vendoradvisory?qidtp=oracle_vm_server_for_x86_bulletins&qid=05b5bbd6fb289370b459faf1f4e3919d

Trust: 0.1

title:Oracle Linux Bulletins: Oracle Linux Bulletin - October 2018url:https://vulmon.com/vendoradvisory?qidtp=oracle_linux_bulletins&qid=9cb9a8ed428c6faca615e91d2f1a216d

Trust: 0.1

title:IBM: IBM Security Bulletin: Multiple Security Vulnerabilities have been fixed in IBM Security Privileged Identity Manager Appliance.url:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=f5bb2b180c7c77e5a02747a1f31830d9

Trust: 0.1

title:IBM: IBM Security Bulletin: IBM API Connect has addressed multiple vulnerabilities in Developer Portal’s dependencies – Cumulative list from June 28, 2018 to December 13, 2018url:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=43da2cd72c1e378d8d94ecec029fcc61

Trust: 0.1

title:my_refurl:https://github.com/chetanshirke/my_ref

Trust: 0.1

title: - url:https://github.com/ozipoetra/natvps-dns

Trust: 0.1

title:cve_diff_checkerurl:https://github.com/lcatro/cve_diff_checker

Trust: 0.1

title:SamsungReleaseNotesurl:https://github.com/samreleasenotes/SamsungReleaseNotes

Trust: 0.1

title:BleepingComputerurl:https://www.bleepingcomputer.com/news/security/windows-systems-vulnerable-to-fragmentsmack-90s-like-dos-bug/

Trust: 0.1

title:BleepingComputerurl:https://www.bleepingcomputer.com/news/linux/two-ddos-friendly-bugs-fixed-in-linux-kernel/

Trust: 0.1

title:BleepingComputerurl:https://www.bleepingcomputer.com/news/security/over-80-cisco-products-affected-by-fragmentsmack-dos-bug/

Trust: 0.1

sources: VULMON: CVE-2018-5391 // JVNDB: JVNDB-2018-006630 // CNNVD: CNNVD-201808-570

EXTERNAL IDS

db:NVDid:CVE-2018-5391

Trust: 3.9

db:CERT/CCid:VU#641765

Trust: 3.7

db:BIDid:105108

Trust: 2.1

db:OPENWALLid:OSS-SECURITY/2019/06/28/2

Trust: 1.8

db:OPENWALLid:OSS-SECURITY/2019/07/06/4

Trust: 1.8

db:OPENWALLid:OSS-SECURITY/2019/07/06/3

Trust: 1.8

db:SIEMENSid:SSA-377115

Trust: 1.8

db:SECTRACKid:1041476

Trust: 1.8

db:SECTRACKid:1041637

Trust: 1.8

db:JVNid:JVNVU93630542

Trust: 0.8

db:JVNDBid:JVNDB-2018-006630

Trust: 0.8

db:CNNVDid:CNNVD-201808-570

Trust: 0.7

db:AUSCERTid:ESB-2019.0545

Trust: 0.6

db:AUSCERTid:ESB-2019.0623

Trust: 0.6

db:AUSCERTid:ESB-2019.0854

Trust: 0.6

db:AUSCERTid:ESB-2020.1315

Trust: 0.6

db:AUSCERTid:ESB-2019.0675

Trust: 0.6

db:ICS CERTid:ICSA-20-105-05

Trust: 0.6

db:PACKETSTORMid:148928

Trust: 0.1

db:VULHUBid:VHN-135422

Trust: 0.1

db:VULMONid:CVE-2018-5391

Trust: 0.1

db:PACKETSTORMid:148912

Trust: 0.1

db:PACKETSTORMid:149543

Trust: 0.1

db:PACKETSTORMid:150068

Trust: 0.1

db:PACKETSTORMid:148914

Trust: 0.1

db:PACKETSTORMid:148917

Trust: 0.1

db:PACKETSTORMid:149726

Trust: 0.1

db:PACKETSTORMid:149024

Trust: 0.1

db:PACKETSTORMid:149830

Trust: 0.1

db:PACKETSTORMid:150191

Trust: 0.1

db:PACKETSTORMid:150314

Trust: 0.1

sources: CERT/CC: VU#641765 // VULHUB: VHN-135422 // VULMON: CVE-2018-5391 // BID: 105108 // JVNDB: JVNDB-2018-006630 // PACKETSTORM: 148912 // PACKETSTORM: 149543 // PACKETSTORM: 150068 // PACKETSTORM: 148914 // PACKETSTORM: 148917 // PACKETSTORM: 149726 // PACKETSTORM: 149024 // PACKETSTORM: 149830 // PACKETSTORM: 150191 // PACKETSTORM: 150314 // CNNVD: CNNVD-201808-570 // NVD: CVE-2018-5391

REFERENCES

url:http://www.securityfocus.com/bid/105108

Trust: 3.0

url:https://www.kb.cert.org/vuls/id/641765

Trust: 3.0

url:https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html

Trust: 2.4

url:https://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next.git/commit/?id=c30f1fc041b74ecdb072dd44f858750414b8b19f

Trust: 2.1

url:https://usn.ubuntu.com/3740-1/

Trust: 2.1

url:https://usn.ubuntu.com/3740-2/

Trust: 2.1

url:https://usn.ubuntu.com/3741-1/

Trust: 2.1

url:https://usn.ubuntu.com/3741-2/

Trust: 2.1

url:https://usn.ubuntu.com/3742-1/

Trust: 2.1

url:https://usn.ubuntu.com/3742-2/

Trust: 2.1

url:https://access.redhat.com/errata/rhsa-2018:2791

Trust: 1.9

url:https://access.redhat.com/errata/rhsa-2018:2846

Trust: 1.9

url:https://access.redhat.com/errata/rhsa-2018:2933

Trust: 1.9

url:https://access.redhat.com/errata/rhsa-2018:3083

Trust: 1.9

url:https://access.redhat.com/errata/rhsa-2018:3459

Trust: 1.9

url:https://access.redhat.com/errata/rhsa-2018:3540

Trust: 1.9

url:http://www.arubanetworks.com/assets/alert/aruba-psa-2018-004.txt

Trust: 1.8

url:http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-linux-en

Trust: 1.8

url:https://cert-portal.siemens.com/productcert/pdf/ssa-377115.pdf

Trust: 1.8

url:https://security.netapp.com/advisory/ntap-20181003-0002/

Trust: 1.8

url:https://www.debian.org/security/2018/dsa-4272

Trust: 1.8

url:https://lists.debian.org/debian-lts-announce/2018/08/msg00014.html

Trust: 1.8

url:http://www.openwall.com/lists/oss-security/2019/06/28/2

Trust: 1.8

url:http://www.openwall.com/lists/oss-security/2019/07/06/3

Trust: 1.8

url:http://www.openwall.com/lists/oss-security/2019/07/06/4

Trust: 1.8

url:https://access.redhat.com/errata/rhsa-2018:2785

Trust: 1.8

url:https://access.redhat.com/errata/rhsa-2018:2924

Trust: 1.8

url:https://access.redhat.com/errata/rhsa-2018:2925

Trust: 1.8

url:https://access.redhat.com/errata/rhsa-2018:2948

Trust: 1.8

url:https://access.redhat.com/errata/rhsa-2018:3096

Trust: 1.8

url:https://access.redhat.com/errata/rhsa-2018:3586

Trust: 1.8

url:https://access.redhat.com/errata/rhsa-2018:3590

Trust: 1.8

url:http://www.securitytracker.com/id/1041476

Trust: 1.8

url:http://www.securitytracker.com/id/1041637

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-5391

Trust: 1.8

url:https://www.arista.com/en/support/advisories-notices/security-advisories/5782-security-advisory-37

Trust: 1.1

url:https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/adv180022

Trust: 1.1

url:https://support.f5.com/csp/article/k74374841?utm_source=f5support&amp%3butm_medium=rss

Trust: 1.1

url:https://access.redhat.com/security/cve/cve-2018-5391

Trust: 0.9

url:about vulnerability notes

Trust: 0.8

url:contact us about this vulnerability

Trust: 0.8

url:provide a vendor statement

Trust: 0.8

url:https://supportcenter.checkpoint.com/supportcenter/portal?eventsubmit_dogoviewsolutiondetails=&solutionid=sk134253

Trust: 0.8

url:https://security-tracker.debian.org/tracker/cve-2018-5391

Trust: 0.8

url:https://access.redhat.com/articles/3553061https://bugzilla.redhat.com/show_bug.cgi?id=cve-2018-5391

Trust: 0.8

url:https://www.suse.com/security/cve/cve-2018-5391

Trust: 0.8

url:https://people.canonical.com/

Trust: 0.8

url:https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2018-690

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-5391

Trust: 0.8

url:https://jvn.jp/vu/jvnvu93630542/

Trust: 0.8

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.6

url:https://bugzilla.redhat.com/):

Trust: 0.6

url:https://access.redhat.com/security/team/key/

Trust: 0.6

url:https://access.redhat.com/articles/11258

Trust: 0.6

url:https://access.redhat.com/security/team/contact/

Trust: 0.6

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.6

url:https://support.f5.com/csp/article/k74374841?utm_source=f5support&utm_medium=rss

Trust: 0.6

url:https://www.suse.com/support/update/announcement/2019/suse-su-20190541-1.html

Trust: 0.6

url:https://security.business.xerox.com/wp-content/uploads/2019/11/cert_security_mini_bulletin_xrx19ak_for_altalinkb80xx-c80xx.pdf

Trust: 0.6

url:http://www.ibm.com/support/docview.wss

Trust: 0.6

url:http://www.ibm.com/support/docview.wss?uid=ibm10872368

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.1315/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/75930

Trust: 0.6

url:https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20190123-01-linux-cn

Trust: 0.6

url:https://www.auscert.org.au/bulletins/76246

Trust: 0.6

url:http://www.ibm.com/support/docview.wss?uid=ibm10792535

Trust: 0.6

url:https://www.auscert.org.au/bulletins/76474

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180824-linux-ip-fragment

Trust: 0.6

url:https://us-cert.cisa.gov/ics/advisories/icsa-20-105-05

Trust: 0.6

url:https://www.auscert.org.au/bulletins/77246

Trust: 0.6

url:https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20200115-01-linux-cn

Trust: 0.6

url:https://www.us-cert.gov/ics/advisories/icsa-20-105-05

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2018-5390

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2017-18344

Trust: 0.5

url:https://wiki.ubuntu.com/securityteam/knowledgebase/l1tf

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2018-3646

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2018-3620

Trust: 0.4

url:https://access.redhat.com/articles/3553061

Trust: 0.4

url:https://bugzilla.redhat.com/show_bug.cgi?id=1609664

Trust: 0.3

url:http://www.kernel.org/

Trust: 0.3

url:https://securityadvisories.paloaltonetworks.com/home/detail/131

Trust: 0.3

url:https://www.oracle.com/technetwork/topics/security/linuxbulletinoct2018-5142979.html

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2018-10675

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2018-10675

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2017-18344

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2018-14634

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2018-14634

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2018-5390

Trust: 0.2

url:https://usn.ubuntu.com/usn/usn-3742-2

Trust: 0.2

url:https://access.redhat.com/security/vulnerabilities/mutagen-astronomy

Trust: 0.2

url:https://support.f5.com/csp/article/k74374841?utm_source=f5support&amp;amp;utm_medium=rss

Trust: 0.1

url:https://cwe.mitre.org/data/definitions/20.html

Trust: 0.1

url:https://github.com/chetanshirke/my_ref

Trust: 0.1

url:https://tools.cisco.com/security/center/viewalert.x?alertid=58766

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-kvm/4.15.0-1019.19

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure/4.15.0-1021.21

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/4.15.0-1019.19

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp/4.15.0-1017.18

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oem/4.15.0-1015.18

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-raspi2/4.15.0-1020.22

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/4.15.0-32.35

Trust: 0.1

url:https://usn.ubuntu.com/usn/usn-3740-1

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-13405

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-7740

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-5803

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-18232

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-5344

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-1094

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-18208

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-10940

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-17805

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-10881

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-1092

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-1120

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-13405

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-18232

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-1000026

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-1094

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-7757

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-10940

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-0861

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-1118

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-1130

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-10661

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-17805

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-10879

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-10902

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-8830

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-10883

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-7740

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-5848

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-10322

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-4913

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-10883

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-1118

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-5803

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-10878

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-10879

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-10902

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-1000026

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-0861

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-8781

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-8830

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-10322

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-10881

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-1092

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-5848

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-4913

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-18208

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-1130

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-10661

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.6_release_notes/index

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-1120

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-10878

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-5344

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/4.4.0-133.159

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-raspi2/4.4.0-1094.102

Trust: 0.1

url:https://usn.ubuntu.com/usn/usn-3741-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-snapdragon/4.4.0-1098.103

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/4.4.0-1065.75

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-kvm/4.4.0-1031.37

Trust: 0.1

url:https://usn.ubuntu.com/usn/usn-3742-1

Trust: 0.1

url:https://access.redhat.com/articles/3635371

Trust: 0.1

url:https://usn.ubuntu.com/usn/usn-3742-3

Trust: 0.1

url:https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1787258

Trust: 0.1

url:https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1787127

Trust: 0.1

url:https://access.redhat.com/articles/3674801

Trust: 0.1

url:https://access.redhat.com/articles/3684891

Trust: 0.1

sources: CERT/CC: VU#641765 // VULHUB: VHN-135422 // VULMON: CVE-2018-5391 // BID: 105108 // JVNDB: JVNDB-2018-006630 // PACKETSTORM: 148912 // PACKETSTORM: 149543 // PACKETSTORM: 150068 // PACKETSTORM: 148914 // PACKETSTORM: 148917 // PACKETSTORM: 149726 // PACKETSTORM: 149024 // PACKETSTORM: 149830 // PACKETSTORM: 150191 // PACKETSTORM: 150314 // CNNVD: CNNVD-201808-570 // NVD: CVE-2018-5391

CREDITS

Red Hat

Trust: 0.6

sources: PACKETSTORM: 149543 // PACKETSTORM: 150068 // PACKETSTORM: 149726 // PACKETSTORM: 149830 // PACKETSTORM: 150191 // PACKETSTORM: 150314

SOURCES

db:CERT/CCid:VU#641765
db:VULHUBid:VHN-135422
db:VULMONid:CVE-2018-5391
db:BIDid:105108
db:JVNDBid:JVNDB-2018-006630
db:PACKETSTORMid:148912
db:PACKETSTORMid:149543
db:PACKETSTORMid:150068
db:PACKETSTORMid:148914
db:PACKETSTORMid:148917
db:PACKETSTORMid:149726
db:PACKETSTORMid:149024
db:PACKETSTORMid:149830
db:PACKETSTORMid:150191
db:PACKETSTORMid:150314
db:CNNVDid:CNNVD-201808-570
db:NVDid:CVE-2018-5391

LAST UPDATE DATE

2024-12-20T19:44:23.381000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#641765date:2018-10-12T00:00:00
db:VULHUBid:VHN-135422date:2022-12-28T00:00:00
db:VULMONid:CVE-2018-5391date:2023-11-07T00:00:00
db:BIDid:105108date:2019-02-15T14:00:00
db:JVNDBid:JVNDB-2018-006630date:2019-07-26T00:00:00
db:CNNVDid:CNNVD-201808-570date:2022-12-29T00:00:00
db:NVDid:CVE-2018-5391date:2024-11-21T04:08:43.897

SOURCES RELEASE DATE

db:CERT/CCid:VU#641765date:2018-08-14T00:00:00
db:VULHUBid:VHN-135422date:2018-09-06T00:00:00
db:VULMONid:CVE-2018-5391date:2018-09-06T00:00:00
db:BIDid:105108date:2018-08-14T00:00:00
db:JVNDBid:JVNDB-2018-006630date:2018-08-28T00:00:00
db:PACKETSTORMid:148912date:2018-08-15T04:42:35
db:PACKETSTORMid:149543date:2018-09-25T23:02:25
db:PACKETSTORMid:150068date:2018-10-31T01:11:41
db:PACKETSTORMid:148914date:2018-08-15T04:42:46
db:PACKETSTORMid:148917date:2018-08-15T04:43:02
db:PACKETSTORMid:149726date:2018-10-09T17:02:09
db:PACKETSTORMid:149024date:2018-08-21T20:20:00
db:PACKETSTORMid:149830date:2018-10-17T15:42:07
db:PACKETSTORMid:150191date:2018-11-06T21:04:13
db:PACKETSTORMid:150314date:2018-11-14T01:33:01
db:CNNVDid:CNNVD-201808-570date:2018-08-20T00:00:00
db:NVDid:CVE-2018-5391date:2018-09-06T21:29:00.363