ID

VAR-201902-0242


CVE

CVE-2019-6974


TITLE

Linux kernel Resource Management Error Vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-201902-612

DESCRIPTION

In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandles reference counting because of a race condition, leading to a use-after-free. Linux kernel is prone to a security bypass vulnerability. Attackers can exploit this issue to bypass security restrictions to perform unauthorized actions; this may aid in launching further attacks. Versions prior to Linux kernel 4.20.8 are vulnerable. ========================================================================== Ubuntu Security Notice USN-3930-2 April 02, 2019 linux-hwe, linux-azure vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 18.04 LTS Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux-azure: Linux kernel for Microsoft Azure Cloud systems - linux-hwe: Linux hardware enablement (HWE) kernel Details: USN-3930-1 fixed vulnerabilities in the Linux kernel for Ubuntu 18.10. This update provides the corresponding updates for the Linux Hardware Enablement (HWE) kernel from Ubuntu 18.10 for Ubuntu 18.04 LTS. Mathias Payer and Hui Peng discovered a use-after-free vulnerability in the Advanced Linux Sound Architecture (ALSA) subsystem. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2018-19824) Shlomi Oberman, Yuli Shapiro, and Ran Menscher discovered an information leak in the Bluetooth implementation of the Linux kernel. An attacker within Bluetooth range could use this to expose sensitive information (kernel memory). An attacker in a guest VM with access to /dev/kvm could use this to cause a denial of service (guest VM crash). (CVE-2019-6974) Jim Mattson and Felix Wilhelm discovered a use-after-free vulnerability in the KVM subsystem of the Linux kernel, when using nested virtual machines. A local attacker in a guest VM could use this to cause a denial of service (system crash) or possibly execute arbitrary code in the host system. (CVE-2019-7221) Felix Wilhelm discovered that an information leak vulnerability existed in the KVM subsystem of the Linux kernel, when nested virtualization is used. A local attacker could use this to expose sensitive information (host system memory to a guest VM). (CVE-2019-7222) Jann Horn discovered that the eBPF implementation in the Linux kernel was insufficiently hardened against Spectre V1 attacks. A local attacker could use this to expose sensitive information. (CVE-2019-7308) It was discovered that a use-after-free vulnerability existed in the user- space API for crypto (af_alg) implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2019-8956) It was discovered that the Linux kernel did not properly deallocate memory when handling certain errors while reading files. A local attacker could use this to cause a denial of service (excessive memory consumption). A local attacker with access to the IPMI character device files could use this to cause a denial of service (system crash). (CVE-2019-9003) Jann Horn discovered that the SNMP NAT implementation in the Linux kernel performed insufficient ASN.1 length checks. An attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2019-9162) Jann Horn discovered that the mmap implementation in the Linux kernel did not properly check for the mmap minimum address in some situations. A local attacker could use this to assist exploiting a kernel NULL pointer dereference vulnerability. (CVE-2019-9213) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 18.04 LTS: linux-image-4.18.0-1014-azure 4.18.0-1014.14~18.04.1 linux-image-4.18.0-17-generic 4.18.0-17.18~18.04.1 linux-image-4.18.0-17-generic-lpae 4.18.0-17.18~18.04.1 linux-image-4.18.0-17-lowlatency 4.18.0-17.18~18.04.1 linux-image-4.18.0-17-snapdragon 4.18.0-17.18~18.04.1 linux-image-azure 4.18.0.1014.13 linux-image-generic-hwe-18.04 4.18.0.17.67 linux-image-generic-lpae-hwe-18.04 4.18.0.17.67 linux-image-lowlatency-hwe-18.04 4.18.0.17.67 linux-image-snapdragon-hwe-18.04 4.18.0.17.67 linux-image-virtual-hwe-18.04 4.18.0.17.67 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References: https://usn.ubuntu.com/usn/usn-3930-2 https://usn.ubuntu.com/usn/usn-3930-1 CVE-2018-19824, CVE-2019-3459, CVE-2019-3460, CVE-2019-6974, CVE-2019-7221, CVE-2019-7222, CVE-2019-7308, CVE-2019-8912, CVE-2019-8956, CVE-2019-8980, CVE-2019-9003, CVE-2019-9162, CVE-2019-9213 Package Information: https://launchpad.net/ubuntu/+source/linux-azure/4.18.0-1014.14~18.04.1 https://launchpad.net/ubuntu/+source/linux-hwe/4.18.0-17.18~18.04.1 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2020:0103-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2020:0103 Issue date: 2020-01-14 CVE Names: CVE-2018-10853 CVE-2018-18281 CVE-2018-20856 CVE-2019-6974 CVE-2019-11599 ==================================================================== 1. Summary: An update for kernel is now available for Red Hat Enterprise Linux 7.4 Advanced Update Support, Red Hat Enterprise Linux 7.4 Telco Extended Update Support, and Red Hat Enterprise Linux 7.4 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Server AUS (v. 7.4) - noarch, x86_64 Red Hat Enterprise Linux Server E4S (v. 7.4) - noarch, ppc64le, x86_64 Red Hat Enterprise Linux Server Optional AUS (v. 7.4) - x86_64 Red Hat Enterprise Linux Server Optional E4S (v. 7.4) - ppc64le, x86_64 Red Hat Enterprise Linux Server Optional TUS (v. 7.4) - x86_64 Red Hat Enterprise Linux Server TUS (v. 7.4) - noarch, x86_64 3. Security Fix(es): * kernel: Use-after-free in __blk_drain_queue() function in block/blk-core.c (CVE-2018-20856) * Kernel: KVM: potential use-after-free via kvm_ioctl_create_device() (CVE-2019-6974) * kernel: kvm: guest userspace to guest kernel write (CVE-2018-10853) * kernel: TLB flush happens too late on mremap (CVE-2018-18281) * kernel: fix race condition between mmget_not_zero()/get_task_mm() and core dumping (CVE-2019-11599) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * guest softlockup in mem_cgroup_reparent_charges with 800GB guests (BZ#1770111) * [RHEL7.7] Refined TSC clocksource calibration occasionally fails on some SkyLake-X servers (BZ#1775682) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1589890 - CVE-2018-10853 kernel: kvm: guest userspace to guest kernel write 1645121 - CVE-2018-18281 kernel: TLB flush happens too late on mremap 1671913 - CVE-2019-6974 Kernel: KVM: potential use-after-free via kvm_ioctl_create_device() 1705937 - CVE-2019-11599 kernel: fix race condition between mmget_not_zero()/get_task_mm() and core dumping 1738705 - CVE-2018-20856 kernel: Use-after-free in __blk_drain_queue() function in block/blk-core.c 6. Package List: Red Hat Enterprise Linux Server AUS (v. 7.4): Source: kernel-3.10.0-693.62.1.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-693.62.1.el7.noarch.rpm kernel-doc-3.10.0-693.62.1.el7.noarch.rpm x86_64: kernel-3.10.0-693.62.1.el7.x86_64.rpm kernel-debug-3.10.0-693.62.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-693.62.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-693.62.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-693.62.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-693.62.1.el7.x86_64.rpm kernel-devel-3.10.0-693.62.1.el7.x86_64.rpm kernel-headers-3.10.0-693.62.1.el7.x86_64.rpm kernel-tools-3.10.0-693.62.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-693.62.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-693.62.1.el7.x86_64.rpm perf-3.10.0-693.62.1.el7.x86_64.rpm perf-debuginfo-3.10.0-693.62.1.el7.x86_64.rpm python-perf-3.10.0-693.62.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-693.62.1.el7.x86_64.rpm Red Hat Enterprise Linux Server E4S (v. 7.4): Source: kernel-3.10.0-693.62.1.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-693.62.1.el7.noarch.rpm kernel-doc-3.10.0-693.62.1.el7.noarch.rpm ppc64le: kernel-3.10.0-693.62.1.el7.ppc64le.rpm kernel-bootwrapper-3.10.0-693.62.1.el7.ppc64le.rpm kernel-debug-3.10.0-693.62.1.el7.ppc64le.rpm kernel-debug-debuginfo-3.10.0-693.62.1.el7.ppc64le.rpm kernel-debuginfo-3.10.0-693.62.1.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-693.62.1.el7.ppc64le.rpm kernel-devel-3.10.0-693.62.1.el7.ppc64le.rpm kernel-headers-3.10.0-693.62.1.el7.ppc64le.rpm kernel-tools-3.10.0-693.62.1.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-693.62.1.el7.ppc64le.rpm kernel-tools-libs-3.10.0-693.62.1.el7.ppc64le.rpm perf-3.10.0-693.62.1.el7.ppc64le.rpm perf-debuginfo-3.10.0-693.62.1.el7.ppc64le.rpm python-perf-3.10.0-693.62.1.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-693.62.1.el7.ppc64le.rpm x86_64: kernel-3.10.0-693.62.1.el7.x86_64.rpm kernel-debug-3.10.0-693.62.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-693.62.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-693.62.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-693.62.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-693.62.1.el7.x86_64.rpm kernel-devel-3.10.0-693.62.1.el7.x86_64.rpm kernel-headers-3.10.0-693.62.1.el7.x86_64.rpm kernel-tools-3.10.0-693.62.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-693.62.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-693.62.1.el7.x86_64.rpm perf-3.10.0-693.62.1.el7.x86_64.rpm perf-debuginfo-3.10.0-693.62.1.el7.x86_64.rpm python-perf-3.10.0-693.62.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-693.62.1.el7.x86_64.rpm Red Hat Enterprise Linux Server TUS (v. 7.4): Source: kernel-3.10.0-693.62.1.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-693.62.1.el7.noarch.rpm kernel-doc-3.10.0-693.62.1.el7.noarch.rpm x86_64: kernel-3.10.0-693.62.1.el7.x86_64.rpm kernel-debug-3.10.0-693.62.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-693.62.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-693.62.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-693.62.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-693.62.1.el7.x86_64.rpm kernel-devel-3.10.0-693.62.1.el7.x86_64.rpm kernel-headers-3.10.0-693.62.1.el7.x86_64.rpm kernel-tools-3.10.0-693.62.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-693.62.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-693.62.1.el7.x86_64.rpm perf-3.10.0-693.62.1.el7.x86_64.rpm perf-debuginfo-3.10.0-693.62.1.el7.x86_64.rpm python-perf-3.10.0-693.62.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-693.62.1.el7.x86_64.rpm Red Hat Enterprise Linux Server Optional AUS (v. 7.4): x86_64: kernel-debug-debuginfo-3.10.0-693.62.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-693.62.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-693.62.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-693.62.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-693.62.1.el7.x86_64.rpm perf-debuginfo-3.10.0-693.62.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-693.62.1.el7.x86_64.rpm Red Hat Enterprise Linux Server Optional E4S (v. 7.4): ppc64le: kernel-debug-debuginfo-3.10.0-693.62.1.el7.ppc64le.rpm kernel-debug-devel-3.10.0-693.62.1.el7.ppc64le.rpm kernel-debuginfo-3.10.0-693.62.1.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-693.62.1.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-693.62.1.el7.ppc64le.rpm kernel-tools-libs-devel-3.10.0-693.62.1.el7.ppc64le.rpm perf-debuginfo-3.10.0-693.62.1.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-693.62.1.el7.ppc64le.rpm x86_64: kernel-debug-debuginfo-3.10.0-693.62.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-693.62.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-693.62.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-693.62.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-693.62.1.el7.x86_64.rpm perf-debuginfo-3.10.0-693.62.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-693.62.1.el7.x86_64.rpm Red Hat Enterprise Linux Server Optional TUS (v. 7.4): x86_64: kernel-debug-debuginfo-3.10.0-693.62.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-693.62.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-693.62.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-693.62.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-693.62.1.el7.x86_64.rpm perf-debuginfo-3.10.0-693.62.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-693.62.1.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2020 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBXh3j4tzjgjWX9erEAQgrsA/7BKPcBbg2RX7I5HWuL2oC26IWdlrmbC+9 3wjegJPnhVuPkRXGWb7fCC4yVe4VjoeVRBN2HRCsyU4q9d9oPnVwldrRwzElGQdJ v93Ac7aOwy4fZMD8rwukWaPd9OmQnT/hM7cLAbozSqL+tBRo1G2fjuE1sBscIZDB qFHqRWA/nup6Qm8miiz/vnnEZCukXRMzgk8NO6jMjUR0TQ65hMZc0TTrElZZ99Z6 Bcm7C2nnw3CK0ewJewxPS21d/r4Rs7dpGF/6xjnsAzSPpO6HhzBmSTDoHe8uhsz7 lfjh79KcljPTe+mG1iO0E4l9aNnpNRWd7XZ4JVpQw6Ne47XGTMiybLivfPKo141q WlyfSdxxgyPZjI1xejmt/eqLiliTiuTj65Hlf8yn76DZOCGg22KZUNg1K8U/RWGz mlM34oeozfamjRNXYAibIW9zW65Y9DZ+sM6NLVulcYFGkqsX/t5yE3otkMUzDilK 6nLnXZ7Uu8jJz89mLWcNVY/mKBFP5WNsyZdThFt4q7koNwwNviHDSzQzyTTsgMwd P7sBoOYpqevd+WA/qS103ZyrEurjM/yFbNcbQDJcrT9SgV00YBzAkyGXz4IJ5Jy9 0DNYTkOwKhfbG+WLfQwvfL9FYv5TkkjHy6BIcOjzbQXM/pQAR5AybYOPROoi/Q7R R0SZU3D8SVo=IHlt -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . M. 7) - aarch64, noarch, ppc64le 3. Bug Fix(es): * [kernel-alt]: BUG: unable to handle kernel NULL pointer IP: crypto_remove_spawns+0x118/0x2e0 (BZ#1536967) * [HPE Apache] update ssif max_xmit_msg_size limit for multi-part messages (BZ#1610534) * RHEL-Alt-7.6 - powerpc/pseries: Fix unitialized timer reset on migration / powerpc/pseries/mobility: Extend start/stop topology update scope (LPM) (BZ#1673613) * RHEL-Alt-7.6 - s390: sha3_generic module fails and triggers panic when in FIPS mode (BZ#1673979) * RHEL-Alt-7.6 - System crashed after oom - During ICP deployment (BZ#1710304) * kernel-alt: Race condition in hashtables [rhel-alt-7.6.z] (BZ#1712127) * RHEL-Alt-7.6 - OP930:PM_Test:cpupower -r command set values for first 3 cores in quad and misses last core. (CORAL) (BZ#1717836) * RHEL-Alt-7.6 - disable runtime NUMA remapping for PRRN/LPM/VPHN (BZ#1717906) * fragmented packets timing out (BZ#1729066) * Backport TCP follow-up for small buffers (BZ#1733617) Enhancement(s): * RHEL-Alt-7.6 - perfevent PMDA cannot create file descriptors for reading nest events using the perf API (pcp/kernel) (CORAL) (BZ#1723036) 4

Trust: 2.16

sources: NVD: CVE-2019-6974 // BID: 107127 // VULHUB: VHN-158409 // VULMON: CVE-2019-6974 // PACKETSTORM: 152379 // PACKETSTORM: 152369 // PACKETSTORM: 152377 // PACKETSTORM: 152375 // PACKETSTORM: 152370 // PACKETSTORM: 152380 // PACKETSTORM: 155951 // PACKETSTORM: 152374 // PACKETSTORM: 154553

AFFECTED PRODUCTS

vendor:f5model:big-ip webacceleratorscope:gteversion:13.0.0

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:3.19

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:lteversion:13.1.1

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip link controllerscope:gteversion:13.0.0

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:4.5

Trust: 1.0

vendor:redhatmodel:enterprise linux serverscope:eqversion:7.0

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:gteversion:14.0.0

Trust: 1.0

vendor:redhatmodel:enterprise linuxscope:eqversion:7.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:lteversion:13.1.1

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:gteversion:13.0.0

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:ltversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:lteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:lteversion:13.1.1

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:8.0

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:lteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:gteversion:15.0.0

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:4.4.176

Trust: 1.0

vendor:f5model:big-ip analyticsscope:gteversion:13.0.0

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:4.15

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:gteversion:14.0.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:12.04

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:gteversion:15.0.0

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:ltversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:lteversion:13.1.1

Trust: 1.0

vendor:f5model:big-ip analyticsscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:ltversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:ltversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:gteversion:15.0.0

Trust: 1.0

vendor:redhatmodel:enterprise linux eusscope:eqversion:7.5

Trust: 1.0

vendor:f5model:big-ip analyticsscope:ltversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:lteversion:14.1.0

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:3.18.136

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:18.04

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:lteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip link controllerscope:lteversion:13.1.1

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:4.10

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:lteversion:13.1.1

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:ltversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:lteversion:14.1.0

Trust: 1.0

vendor:redhatmodel:openshift container platformscope:eqversion:3.11

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:gteversion:13.0.0

Trust: 1.0

vendor:f5model:big-ip analyticsscope:lteversion:13.1.1

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:gteversion:14.0.0

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:4.9.156

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:lteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:ltversion:15.1.0

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:4.14.99

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:gteversion:15.0.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:lteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:lteversion:14.1.0

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:4.20

Trust: 1.0

vendor:redhatmodel:enterprise linux server eusscope:eqversion:7.6

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:ltversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:gteversion:15.0.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:ltversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:lteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip analyticsscope:gteversion:15.0.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:ltversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:lteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:ltversion:15.1.0

Trust: 1.0

vendor:redhatmodel:enterprise linux server tusscope:eqversion:7.6

Trust: 1.0

vendor:redhatmodel:enterprise linux server tusscope:eqversion:7.4

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:gteversion:15.0.0

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:lteversion:13.1.1

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:3.10

Trust: 1.0

vendor:f5model:big-ip application security managerscope:lteversion:13.1.1

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:gteversion:13.0.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:14.04

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:gteversion:15.0.0

Trust: 1.0

vendor:f5model:big-ip link controllerscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip link controllerscope:ltversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:gteversion:13.0.0

Trust: 1.0

vendor:redhatmodel:enterprise linux desktopscope:eqversion:7.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:lteversion:13.1.1

Trust: 1.0

vendor:f5model:big-ip link controllerscope:lteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:gteversion:15.0.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:gteversion:15.0.0

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:gteversion:14.0.0

Trust: 1.0

vendor:redhatmodel:enterprise linux workstationscope:eqversion:7.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:gteversion:13.0.0

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:3.16.64

Trust: 1.0

vendor:f5model:big-ip analyticsscope:lteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:gteversion:13.0.0

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:4.19.21

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:16.04

Trust: 1.0

vendor:f5model:big-ip link controllerscope:gteversion:15.0.0

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:7.6

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:4.20.8

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:gteversion:13.0.0

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:7.4

Trust: 1.0

vendor:f5model:big-ip application security managerscope:gteversion:13.0.0

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:gteversion:15.0.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:18.10

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:gteversion:13.0.0

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:3.17

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:lteversion:13.1.1

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:lteversion:13.1.1

Trust: 1.0

vendor:linuxmodel:kernel 3.15.6-200.fc20scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.12

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.16.58

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.62

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.24.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.25.13

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.16.43

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.31.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.14.78

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.16.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.28.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.18.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.16.37

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.12

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.36

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.16

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.80

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.14.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.10.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.15

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.27.46

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.11.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.7.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.16.48

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.26.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.16

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.13.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.16.38

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.16.11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.25.8

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.12

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.23.7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.14.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.17.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.18.2

Trust: 0.3

vendor:linuxmodel:kernel 3.19-rc7scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.6.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.15.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.34.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.17

Trust: 0.3

vendor:linuxmodel:kernel -rc6scope:eqversion:2.6.26

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.31.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.16.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.65

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.13.8

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.16

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.25.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.17.7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.24.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.17.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.20.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.16.14

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.14.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.13.11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.24.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.17.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.42

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.45

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.28.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.17.8

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.23.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.16.30

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.88

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.16.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.48

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.29.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.8

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.31

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.22.7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.17.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.63-2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.7.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.22

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.7.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.1.15

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.15.14

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13.11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.10.13

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.13.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.267

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.25.7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.18.11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.214

Trust: 0.3

vendor:linuxmodel:kernel 3.14-rc4scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.8.5

Trust: 0.3

vendor:linuxmodel:kernel 3.10-rc5scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.14.11

Trust: 0.3

vendor:linuxmodel:kernel 2.6.22-rc7scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.13.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.19.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.25.11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.6.8

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.14.15

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.13.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.1.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.17.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.13

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.14.7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.17

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.14.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.11.7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.20.13

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.0.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.18.12

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.34

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.19.19

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.22.16

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.15.7

Trust: 0.3

vendor:linuxmodel:kernel 3.14-rc1scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18.22

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.25.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.54

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.16.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.6.11

Trust: 0.3

vendor:linuxmodel:kernel 3.19-rcscope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.10.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.11.7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.14.71

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.18

Trust: 0.3

vendor:linuxmodel:kernel 3.15-rc1scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.27.54

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.14

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.87

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.16.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.17

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.12

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.90

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.11.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.53

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.19.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.71

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.10.8

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.12.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.12.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.67

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.23.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.40

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.16.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.14.31

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.30

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.26

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.70

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.17

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.19.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.16.23

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.15.8

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.15

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.7.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.22

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14-4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.28.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.27.26

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.17.11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.27.8

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.27.12

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.20.11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.11.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.17.13

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.16.45

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.3.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.17.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.11.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.25.12

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.8

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.16.39

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.17.1

Trust: 0.3

vendor:linuxmodel:kernel rc6scope:eqversion:2.6.22

Trust: 0.3

vendor:linuxmodel:kernel 3.13-rc1scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.16.50

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.29

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.10.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.16.47

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.6.7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.18

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.20.7

Trust: 0.3

vendor:linuxmodel:kernel 3.14-rc3scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.17

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.62

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.28.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.6.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.15

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.15.11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.5.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.76

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.16.18

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.12

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.29.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.22.11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.14.7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.16.11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.20.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.15.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.25.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.33.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.28

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.273

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.16.36

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.11.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.24

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.17.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.1.47

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.7.7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.44

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.27

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.11.8

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.82

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.31.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.1.1

Trust: 0.3

vendor:linuxmodel:kernel 2.6.22-rc1scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.16.35

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.13

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.55

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.14.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.21.7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.20-2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.16.34

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.5.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.17.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.28.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18.8

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.21

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.81

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.50

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.27.13

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.37

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.3.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.25.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.11.12

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.14.8

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.15.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.18.8

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.59

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.5.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.16.36

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.11.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.8.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.14.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6

Trust: 0.3

vendor:linuxmodel:kernel 3.19-rc2scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.12.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.15.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.17.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.11.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.14.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.17

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.16

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.16.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.20.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.11.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.18.16

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.72

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.12.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.16.27

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.22.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.14.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.75

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.66

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.10

Trust: 0.3

vendor:linuxmodel:kernel 3.15-rc3scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.20.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.16.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.22.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.23

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.32

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.33.7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.64

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.63

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.8.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.93

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.17.14

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.5.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.15.7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.27.51

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.11.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.57

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.16.33

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.14.67

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.22.8

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.22.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.22.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.27.49

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.15.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.31.11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.20.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.21

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.25.15

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.21.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.16.15

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.16.24

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.31

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14.7

Trust: 0.3

vendor:linuxmodel:kernel 3.11-rc7scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.28.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.7.8

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.17.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.0.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.23.14

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.22.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.2712

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.18-53

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.23.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.16.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.73

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.19.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.19

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.16.40

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.19.13

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.34.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14-1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.14.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.30.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.64

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.27.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.7.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.23

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.56

Trust: 0.3

vendor:linuxmodel:kernel 2.6.25-rc1scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.24.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.16.22

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.14

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.25

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.14.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.12.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.21.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.27.14

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.13

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.17.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.43

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.15-27.48

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.18

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.11.2

Trust: 0.3

vendor:linuxmodel:kernel 3.11-rc1scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.16.25

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.27.24

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.26

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.12.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.44

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.19.3

Trust: 0.3

vendor:linuxmodel:kernel 2.6.34-rc6scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.11.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18.17

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.35

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.73

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.27

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.65

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.20.12

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.13.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.17.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.14.2

Trust: 0.3

vendor:linuxmodel:kernel 3.0-rc1scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.5.7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.18

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.22

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.3113

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.20.15

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.20.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.14.13

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.13

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.11.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.42

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.22.15

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.30

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.10.12

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.25.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.12.12

Trust: 0.3

vendor:linuxmodel:kernel 4.16-rcscope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.10.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.20.14

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.18

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.3.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.15.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.41

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.26

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.6.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.10.11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.15.11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.31

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.18

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.17.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.58

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.12.22

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.13.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.13.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.10.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.11.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.15.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.21.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.21

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.12

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.26.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.22.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.13.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.15.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.16.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.13

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.23.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.14.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.81

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.19

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.72

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.15.16

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.7.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.16

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.16.51

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18.7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.16.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.18.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.6.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.38

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.16.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.18.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.10.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.37.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.52

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.16.16

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.12.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.1.8

Trust: 0.3

vendor:linuxmodel:kernel rc2scope:eqversion:2.6.23

Trust: 0.3

vendor:linuxmodel:kernel 3.14-rc7scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18.11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.16.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.14

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.16.46

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.23.1

Trust: 0.3

vendor:linuxmodel:kernel -rc1scope:eqversion:2.6.16

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.17.7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.6.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.25

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.28.8

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.19.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.13.7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.18.7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.16.28

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.30.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.16.52

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.6.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.38

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.8

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.15.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.51

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.86

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.18.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.29

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.25.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.19.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.21

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.13.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.34

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13.0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.23.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.12.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.16.7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14.37

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.17.11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14.54

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14.73

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.16.12

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.7.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.2519

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.60

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.16.8

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.12.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.16

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.27

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.10.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.18.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.15

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.6.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.78

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.49

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.8.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.20.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.13.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.16.53

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.19.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.16.41

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.20

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.5.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.10.15

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.11

Trust: 0.3

vendor:linuxmodel:kernel 3.15-rc2scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.58

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.15

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.12.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.11.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.16.49

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.7.5

Trust: 0.3

vendor:linuxmodel:kernel 3.1-rc1scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.72

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.19.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.8.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.21.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.18.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.81

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.26.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.37

Trust: 0.3

vendor:linuxmodel:kernel 4.0-rc1scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.60

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.15.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.15.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.30.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.1613

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.16.31

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.13.2

Trust: 0.3

vendor:linuxmodel:kernel 3.11-rc4scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.16.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.16.29

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.11.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.10.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.16.0-28

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.24

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.22.17

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.14.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.23.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.11.11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.28.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.20.8

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.16.44

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.14.14

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.17

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.15

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.18.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.16.32

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.14

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.22.14

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.28.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.20

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.16.13

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14.3

Trust: 0.3

vendor:linuxmodel:kernelscope:neversion:4.20.8

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.19

Trust: 0.3

vendor:linuxmodel:kernel 3.17-rc3scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.24.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.17.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.16.19

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.22

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.14

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14.79

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.14

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.20.4

Trust: 0.3

vendor:linuxmodel:kernel rc7scope:eqversion:2.6.15

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.10.7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.22.12

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.31.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.11.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.69

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.13.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14.45

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.25.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.16.7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.12.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.8.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.8.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.8

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.33

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.23

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.16.26

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.25.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.20.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.19.23

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.36

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.18.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.12.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.22.13

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.16.21

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.11.8

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.98

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.276

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.18.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.20

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.16.17

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.315

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.30.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.17.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.1627

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.30.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.16.20

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.5.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.6.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.26.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.13.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.19

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.17.12

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.34.3

Trust: 0.3

vendor:linuxmodel:kernel 3.14-rc2scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.11.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13.7

Trust: 0.3

sources: BID: 107127 // NVD: CVE-2019-6974

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-6974
value: HIGH

Trust: 1.0

CNNVD: CNNVD-201902-612
value: HIGH

Trust: 0.6

VULHUB: VHN-158409
value: MEDIUM

Trust: 0.1

VULMON: CVE-2019-6974
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2019-6974
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

VULHUB: VHN-158409
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2019-6974
baseSeverity: HIGH
baseScore: 8.1
vectorString: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.2
impactScore: 5.9
version: 3.1

Trust: 1.0

sources: VULHUB: VHN-158409 // VULMON: CVE-2019-6974 // CNNVD: CNNVD-201902-612 // NVD: CVE-2019-6974

PROBLEMTYPE DATA

problemtype:CWE-362

Trust: 1.1

problemtype:CWE-416

Trust: 1.0

sources: VULHUB: VHN-158409 // NVD: CVE-2019-6974

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201902-612

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201902-612

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-158409 // VULMON: CVE-2019-6974

PATCH

title:Linux kernel Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=89404

Trust: 0.6

title:Red Hat: Important: kernel security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20190818 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel-rt security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20190833 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20200103 - Security Advisory

Trust: 0.1

title:Red Hat: CVE-2019-6974url:https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2019-6974

Trust: 0.1

title:Red Hat: Important: kernel security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20193967 - Security Advisory

Trust: 0.1

title:Arch Linux Issues: url:https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues&qid=CVE-2019-6974

Trust: 0.1

title:Amazon Linux AMI: ALAS-2019-1165url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2019-1165

Trust: 0.1

title:Amazon Linux 2: ALAS2-2019-1165url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2-2019-1165

Trust: 0.1

title:Ubuntu Security Notice: linux vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3933-1

Trust: 0.1

title:IBM: IBM Security Bulletin: IBM QRadar Network Security is affected by Linux kernel vulnerabilities (CVE-2019-7221, CVE-2019-6974, CVE-2018-17972, CVE-2018-9568)url:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=3834ad0670b59206d9d7424b96a80d4a

Trust: 0.1

title:Ubuntu Security Notice: linux-lts-trusty vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3933-2

Trust: 0.1

title:Ubuntu Security Notice: linux-hwe, linux-aws-hwe, linux-azure, linux-gcp, linux-oracle vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3931-2

Trust: 0.1

title:Ubuntu Security Notice: linux, linux-aws, linux-gcp, linux-kvm, linux-oem, linux-oracle, linux-raspi2 vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3931-1

Trust: 0.1

title:Ubuntu Security Notice: linux, linux-aws, linux-azure, linux-gcp, linux-kvm, linux-raspi2 vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3930-1

Trust: 0.1

title:Ubuntu Security Notice: linux-hwe, linux-azure vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3930-2

Trust: 0.1

title:Oracle Linux Bulletins: Oracle Linux Bulletin - April 2019url:https://vulmon.com/vendoradvisory?qidtp=oracle_linux_bulletins&qid=0cf12ffad0c479958deb0741d0970b4e

Trust: 0.1

title:Ubuntu Security Notice: linux-lts-xenial, linux-aws vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3932-2

Trust: 0.1

title:Ubuntu Security Notice: linux, linux-aws, linux-kvm, linux-raspi2, linux-snapdragon vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3932-1

Trust: 0.1

title:IBM: IBM Security Bulletin: Vulnerabilities in the Linux Kernel affect PowerKVMurl:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=3e8fb0a522dbdc0368aab05e3c3fb62c

Trust: 0.1

title:Paper310url:https://github.com/Sec20-Paper310/Paper310

Trust: 0.1

title:cve_diff_checkerurl:https://github.com/lcatro/cve_diff_checker

Trust: 0.1

title: - url:https://github.com/vincent-deng/veracode-container-security-finding-parser

Trust: 0.1

sources: VULMON: CVE-2019-6974 // CNNVD: CNNVD-201902-612

EXTERNAL IDS

db:NVDid:CVE-2019-6974

Trust: 3.0

db:BIDid:107127

Trust: 2.1

db:EXPLOIT-DBid:46388

Trust: 2.1

db:PACKETSTORMid:151690

Trust: 0.7

db:CNNVDid:CNNVD-201902-612

Trust: 0.7

db:PACKETSTORMid:155951

Trust: 0.7

db:PACKETSTORMid:155466

Trust: 0.6

db:AUSCERTid:ESB-2019.0675

Trust: 0.6

db:AUSCERTid:ESB-2019.0927.3

Trust: 0.6

db:AUSCERTid:ESB-2020.0151

Trust: 0.6

db:AUSCERTid:ESB-2019.4349

Trust: 0.6

db:AUSCERTid:ESB-2019.4486

Trust: 0.6

db:PACKETSTORMid:152598

Trust: 0.1

db:PACKETSTORMid:152593

Trust: 0.1

db:VULHUBid:VHN-158409

Trust: 0.1

db:VULMONid:CVE-2019-6974

Trust: 0.1

db:PACKETSTORMid:152379

Trust: 0.1

db:PACKETSTORMid:152369

Trust: 0.1

db:PACKETSTORMid:152377

Trust: 0.1

db:PACKETSTORMid:152375

Trust: 0.1

db:PACKETSTORMid:152370

Trust: 0.1

db:PACKETSTORMid:152380

Trust: 0.1

db:PACKETSTORMid:152374

Trust: 0.1

db:PACKETSTORMid:154553

Trust: 0.1

sources: VULHUB: VHN-158409 // VULMON: CVE-2019-6974 // BID: 107127 // PACKETSTORM: 152379 // PACKETSTORM: 152369 // PACKETSTORM: 152377 // PACKETSTORM: 152375 // PACKETSTORM: 152370 // PACKETSTORM: 152380 // PACKETSTORM: 155951 // PACKETSTORM: 152374 // PACKETSTORM: 154553 // CNNVD: CNNVD-201902-612 // NVD: CVE-2019-6974

REFERENCES

url:https://access.redhat.com/errata/rhsa-2020:0103

Trust: 2.5

url:http://www.securityfocus.com/bid/107127

Trust: 2.4

url:https://support.f5.com/csp/article/k11186236

Trust: 2.4

url:https://access.redhat.com/errata/rhsa-2019:3967

Trust: 2.4

url:https://cdn.kernel.org/pub/linux/kernel/v4.x/changelog-4.19.21

Trust: 2.1

url:https://cdn.kernel.org/pub/linux/kernel/v4.x/changelog-4.20.8

Trust: 2.1

url:https://access.redhat.com/errata/rhsa-2019:0818

Trust: 1.9

url:https://access.redhat.com/errata/rhsa-2019:2809

Trust: 1.9

url:https://usn.ubuntu.com/3933-1/

Trust: 1.9

url:https://www.exploit-db.com/exploits/46388/

Trust: 1.8

url:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cfa39381173d5f969daf43582c95ad679189cbc9

Trust: 1.8

url:https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html

Trust: 1.8

url:https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html

Trust: 1.8

url:https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html

Trust: 1.8

url:https://access.redhat.com/errata/rhba-2019:0959

Trust: 1.8

url:https://access.redhat.com/errata/rhsa-2019:0833

Trust: 1.8

url:https://usn.ubuntu.com/3930-1/

Trust: 1.8

url:https://usn.ubuntu.com/3930-2/

Trust: 1.8

url:https://usn.ubuntu.com/3931-1/

Trust: 1.8

url:https://usn.ubuntu.com/3931-2/

Trust: 1.8

url:https://usn.ubuntu.com/3932-1/

Trust: 1.8

url:https://usn.ubuntu.com/3932-2/

Trust: 1.8

url:https://usn.ubuntu.com/3933-2/

Trust: 1.8

url:https://bugs.chromium.org/p/project-zero/issues/detail?id=1765

Trust: 1.5

url:https://cdn.kernel.org/pub/linux/kernel/v4.x/changelog-4.14.99

Trust: 1.5

url:https://cdn.kernel.org/pub/linux/kernel/v4.x/changelog-4.9.156

Trust: 1.5

url:https://github.com/torvalds/linux/commit/cfa39381173d5f969daf43582c95ad679189cbc9

Trust: 1.5

url:https://nvd.nist.gov/vuln/detail/cve-2019-6974

Trust: 1.5

url:https://support.f5.com/csp/article/k11186236?utm_source=f5support&amp%3butm_medium=rss

Trust: 1.1

url:https://www.exploit-db.com/exploits/46388

Trust: 1.0

url:https://access.redhat.com/security/cve/cve-2019-6974

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-9213

Trust: 0.7

url:https://nvd.nist.gov/vuln/detail/cve-2019-7222

Trust: 0.7

url:https://support.f5.com/csp/article/k11186236?utm_source=f5support&utm_medium=rss

Trust: 0.6

url:https://github.com/torvalds/linux/commit/cfa39381173d5f969daf43582c95ad679189cbc9exploitpatchthird party advisory

Trust: 0.6

url:https://cdn.kernel.org/pub/linux/kernel/v4.x/changelog-4.9.156vendor advisory

Trust: 0.6

url:https://cdn.kernel.org/pub/linux/kernel/v4.x/changelog-4.20.8vendor advisory

Trust: 0.6

url:https://cdn.kernel.org/pub/linux/kernel/v4.x/changelog-4.19.21vendor advisory

Trust: 0.6

url:https://cdn.kernel.org/pub/linux/kernel/v4.x/changelog-4.14.99vendor advisory

Trust: 0.6

url:https://bugs.chromium.org/p/project-zero/issues/detail?id=1765exploitmailing listpatchthird party advisory

Trust: 0.6

url:https://www.suse.com/support/update/announcement/2019/suse-su-20190683-1.html

Trust: 0.6

url:https://www.suse.com/support/update/announcement/2019/suse-su-20190541-1.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.0151/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/77542

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.4349/

Trust: 0.6

url:https://packetstormsecurity.com/files/155951/red-hat-security-advisory-2020-0103-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/76474

Trust: 0.6

url:https://packetstormsecurity.com/files/151690/linux-kvm/ioctl/create/device-reference-flow-failure.html

Trust: 0.6

url:https://vigilance.fr/vulnerability/linux-kernel-privilege-escalation-via-kvm-ioctl-create-device-28494

Trust: 0.6

url:https://packetstormsecurity.com/files/155466/red-hat-security-advisory-2019-3967-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.4486/

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2018-19824

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2019-7221

Trust: 0.5

url:http://www.kernel.org/

Trust: 0.3

url:https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cfa39381173d5f969daf43582c95ad679189cbc9

Trust: 0.3

url:https://www.oracle.com/technetwork/topics/security/linuxbulletinapr2019-5461367.html

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-3460

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-7308

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-8912

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-8980

Trust: 0.3

url:https://usn.ubuntu.com/usn/usn-3933-1

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2017-18360

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2017-1000410

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-9162

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-8956

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-9003

Trust: 0.2

url:https://usn.ubuntu.com/usn/usn-3930-1

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-3459

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2018-14610

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-3819

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2018-14616

Trust: 0.2

url:https://usn.ubuntu.com/usn/usn-3932-1

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2017-18249

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2018-14614

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-3701

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2018-14612

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2018-9517

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2018-16884

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2018-14613

Trust: 0.2

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.2

url:https://bugzilla.redhat.com/):

Trust: 0.2

url:https://access.redhat.com/security/team/key/

Trust: 0.2

url:https://access.redhat.com/articles/11258

Trust: 0.2

url:https://access.redhat.com/security/team/contact/

Trust: 0.2

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.2

url:https://support.f5.com/csp/article/k11186236?utm_source=f5support&amp;amp;utm_medium=rss

Trust: 0.1

url:https://cwe.mitre.org/data/definitions/362.html

Trust: 0.1

url:https://cwe.mitre.org/data/definitions/416.html

Trust: 0.1

url:https://tools.cisco.com/security/center/viewalert.x?alertid=59645

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://github.com/sec20-paper310/paper310

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/3.13.0-168.218

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp/4.18.0-1008.9

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure/4.18.0-1014.14

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/4.18.0-1012.14

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/4.18.0-17.18

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-raspi2/4.18.0-1011.13

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-kvm/4.18.0-1009.9

Trust: 0.1

url:https://usn.ubuntu.com/usn/usn-3932-2

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/4.4.0-1040.43

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-lts-xenial/4.4.0-144.170~14.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/4.4.0-145.171

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-raspi2/4.4.0-1106.114

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-kvm/4.4.0-1043.49

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/4.4.0-1079.89

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-snapdragon/4.4.0-1110.115

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure/4.18.0-1014.14~18.04.1

Trust: 0.1

url:https://usn.ubuntu.com/usn/usn-3930-2

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-hwe/4.18.0-17.18~18.04.1

Trust: 0.1

url:https://usn.ubuntu.com/usn/usn-3933-2

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-11599

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-10853

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-10853

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-11599

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-18281

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-20856

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-18281

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-20856

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure/4.15.0-1041.45

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp/4.15.0-1029.31~16.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws-hwe/4.15.0-1035.37~16.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-hwe/4.15.0-47.50~16.04.1

Trust: 0.1

url:https://usn.ubuntu.com/usn/usn-3931-2

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-18021

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-14678

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle/4.15.0-1010.12~16.04.1

Trust: 0.1

url:https://usn.ubuntu.com/usn/usn-3931-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure/4.15.0-1041.45~14.04.1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-5489

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-13272

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-13272

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-5489

Trust: 0.1

sources: VULHUB: VHN-158409 // VULMON: CVE-2019-6974 // BID: 107127 // PACKETSTORM: 152379 // PACKETSTORM: 152369 // PACKETSTORM: 152377 // PACKETSTORM: 152375 // PACKETSTORM: 152370 // PACKETSTORM: 152380 // PACKETSTORM: 155951 // PACKETSTORM: 152374 // PACKETSTORM: 154553 // CNNVD: CNNVD-201902-612 // NVD: CVE-2019-6974

CREDITS

Ubuntu

Trust: 0.7

sources: PACKETSTORM: 152379 // PACKETSTORM: 152369 // PACKETSTORM: 152377 // PACKETSTORM: 152375 // PACKETSTORM: 152370 // PACKETSTORM: 152380 // PACKETSTORM: 152374

SOURCES

db:VULHUBid:VHN-158409
db:VULMONid:CVE-2019-6974
db:BIDid:107127
db:PACKETSTORMid:152379
db:PACKETSTORMid:152369
db:PACKETSTORMid:152377
db:PACKETSTORMid:152375
db:PACKETSTORMid:152370
db:PACKETSTORMid:152380
db:PACKETSTORMid:155951
db:PACKETSTORMid:152374
db:PACKETSTORMid:154553
db:CNNVDid:CNNVD-201902-612
db:NVDid:CVE-2019-6974

LAST UPDATE DATE

2024-12-22T20:57:10.023000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-158409date:2020-10-15T00:00:00
db:VULMONid:CVE-2019-6974date:2023-11-07T00:00:00
db:BIDid:107127date:2019-02-15T00:00:00
db:CNNVDid:CNNVD-201902-612date:2022-04-06T00:00:00
db:NVDid:CVE-2019-6974date:2024-11-21T04:47:20.457

SOURCES RELEASE DATE

db:VULHUBid:VHN-158409date:2019-02-15T00:00:00
db:VULMONid:CVE-2019-6974date:2019-02-15T00:00:00
db:BIDid:107127date:2019-02-15T00:00:00
db:PACKETSTORMid:152379date:2019-04-03T17:17:48
db:PACKETSTORMid:152369date:2019-04-03T17:11:08
db:PACKETSTORMid:152377date:2019-04-03T17:16:18
db:PACKETSTORMid:152375date:2019-04-03T17:14:29
db:PACKETSTORMid:152370date:2019-04-03T17:11:24
db:PACKETSTORMid:152380date:2019-04-03T17:18:08
db:PACKETSTORMid:155951date:2020-01-14T16:33:07
db:PACKETSTORMid:152374date:2019-04-03T17:14:13
db:PACKETSTORMid:154553date:2019-09-20T15:08:09
db:CNNVDid:CNNVD-201902-612date:2019-02-07T00:00:00
db:NVDid:CVE-2019-6974date:2019-02-15T15:29:00.250